Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Let f(z)=q+∑n≥2a(n)qn be a weight k normalized newform with integer coefficients and trivial residual mod 2 Galois representation. We extend the results of Amir and Hong in Amir and Hong (On L-functions of modular elliptic curves and certain K3 surfaces, R ...
2021
, ,
Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves E and E′. This problem is closely related to that of computing the endomorphism ring of ...
Springer2024
We show that shifted pairs of discrete or continuous low-lying horocycles equidistribute in the product space of two modular curves. ...
Jerusalem2023
Over the last few decades, proteins and peptides have become increasingly more common as FDA-approved drugs, despite their inefficient delivery due to their inability to cross the plasma membrane. In this context, bacterial two-component systems, termed AB ...
2021
This thesis is composed of four studies centered on investigating cerebral metabolism using magnetic resonance spectroscopy (MRS) of hyperpolarized and non-hyperpolarized compounds at ultra-high field.
In the first two chapters, we studied longitudinally t ...
The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a polynomial-time key-recovery attack. While some countermeasures have been proposed, th ...
We prove that in any unitary CFT, a twist gap in the spectrum of operator product expansion (OPE) of identical scalar quasiprimary operators (i.e. phi x phi) implies the existence of a family of quasiprimary operators O t,l with spins l ->.infinity and twi ...
Current construction practices follow linear economic models of "take-make-dispose" that result in substantial material landfilling after the end-of-life of buildings. This issue takes relevance given the construction industry's significant stake in the hi ...
International Association for Shell and Spatial Structures (IASS)2023
Abelian varieties are fascinating objects, combining the fields of geometry and arithmetic. While the interest in abelian varieties has long time been of purely theoretic nature, they saw their first real-world application in cryptography in the mid 1980's ...
Given two elliptic curves and the degree of an isogeny between them, finding the isogeny is believed to be a difficult problem—upon which rests the security of nearly any isogeny-based scheme. If, however, to the data above we add information about the beh ...