Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Recently, some collisions have been exposed for a variety of cryptographic hash functions including some of the most widely used today. Many other hash functions using similar constructions can however still be considered secure. Nevertheless, this has dra ...
These data files containg code sources for dataset creation & model learning (neural-jsdf.zip) and collected synthetic dataset of free & collided postures for robotic arm Franka (sdf_3m_full_mesh.mat). Follow the Readme.MD files to launch the code if neede ...
Cryptographic primitives are usually based on a network with boxes. Schnorr and Vaudenay (1994) claimed that all boxes should be multipermutations. In this paper we investigate a few combinatorial properties of multipermutations. We argue that boxes which ...
We present a novel, automated way to find differential paths for MD5. As an application we have shown how, at an approximate expected cost of 2 50 calls to the MD5 compression function, for any two chosen message prefixes P and P′, suffixe ...
This thesis is concerned with the analysis and design of symmetric cryptographic algorithms, with a focus on real-world algorithms. The first part describes original cryptanalysis results, including: The first nontrivial preimage attacks on the (reduced) h ...
This paper describes and analyzes the security of a general-purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these analyzes, we suggest minimum parameter values for the main components of this cryptographic ...
With process technology providing more and more transistors per chip, still following Moore's \law", processor designers have used a number of techniques to make those transistors useful. Lately they have started placing multiple processor cores on each ch ...
These data files containg code sources for dataset creation & model learning (Joint-Space-SCA.zip) and collected synthetic dataset of free & collided postures for humanoid robot iCub (raw_binary_data.zip). Follow the Readme.MD files to launch the code if n ...