Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
It’s a special type of Swiss enclave that Denise Bertschi came across in South Africa in 2018: the Swiss Social & Sports Club welcomes Cape Town’s Swiss ex-pat community and temporary visitors to sit back and relax, be they businesspeople, bankers, or fina ...
Feistel Networks (FN) are now being used massively to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions, modular additions (or other group operations), and when ...
Feistel Networks (FN) are now being used massively to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions, modular additions (or other group operations), and when ...
We investigate the stability and stabilization of the cubic focusing Klein-Gordon equation around static solutions on the closed ball in R3. First we show that the system is linearly unstable near the static solution u≡1 for any dissipat ...
Slender yet densely packed with images, this 44-page publication presents items discovered during an artistic research project that investigated various relationships between Swiss people and the South African apartheid regime in the 1980s and 1990s. Adver ...
The National Institute of Standards and Technology (NIST) recently published a Format-Preserving Encryption standard accepting two Feistel structure based schemes called FF1 and FF3. Particularly, FF3 is a tweakable block cipher based on an 8-round Feistel ...
In this paper, we consider the problem of sequentially optimizing a black-box function f based on noisy samples and bandit feedback. We assume that f is smooth in the sense of having a bounded norm in some reproducing kernel Hilbert space (RKHS), yield ...
We study the optimal strategy for a sailboat to reach an upwind island under the hypothesis that the wind direction fluctuates according to a Brownian motion and the wind speed is constant. The work is motivated by a concrete problem which typically arises ...
This work provides a procedure and methodology for the design of an electro-magnetic sensor based on induction due to ferromagnetic and pure electrically conduc-tive hidden targets. The electromagnetic sensor is made of one or several excitation coils, whi ...
The NIST standard FF3 scheme (also known as BPS scheme) is a tweakable block cipher based on a 8-round Feistel Network. We break it with a practical attack. Our attack exploits the bad domain separation in FF3 design. The attack works with chosen plaintext ...