Publications associées (10)

PassGAN: A Deep Learning Approach for Password Guessing

Fernando Perez Cruz

State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable users to check billions of passwords per second against password hashes. In addition to performing straightforward dictionary attacks, these tools can expand password dic ...
Springer International Publishing2019

Applying a Trojan Horse Strategy to Ruthenium Complexes in the Pursuit of Novel Antibacterial Agents

Paul Joseph Dyson, Lucinda Kate Batchelor, Quentin François Antoine Laurent

Siderophores are iron chelators secreted by bacteria to scavenge iron(III) from their surrounding environment. They possess their own internalization pathway that is sufficiently unselective to be hijacked, making them suitable for Trojan Horse strategy ap ...
2018

Provably Secure Authenticated Encryption

Damian Vizár

Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentiality and authenticity of processed messages at the same time. The research of AE as a primitive in its own right started in 2000. The security goals of AE wer ...
EPFL2018

Emerging Technology Based Design of Primitives for Hardware Security

Giovanni De Micheli, Pierre-Emmanuel Julien Marc Gaillardon

Hardware security concerns such as IP piracy and hardware Trojans have triggered research into circuit protection and malicious logic detection from various design perspectives. In this paper, emerging technologies are investigated by leveraging their uniq ...
Assoc Computing Machinery2016

Runtime Prediction for Scale-Out Data Analytics

Adrian Daniel Popescu

Many analytics applications generate mixed workloads, i.e., workloads comprised of analytical tasks with different processing characteristics including data pre-processing, SQL, and iterative machine learning algorithms. Examples of such mixed workloads ca ...
EPFL2015

How to move from perception to design: application to keystroke sound

Hervé Lissek, Romain Boulandet

Nowadays, customers have legitimate requirements as regards quality that marketing and consumers departments attempt to satisfy. The sound is well-known to enhance or detract from our pleasure in possessing or using a product. Sound quality engineering is ...
2008

Factoring end-user expectations into the sound design process of computer keyboards

Hervé Lissek, Romain Boulandet

The poor acoustic comfort of usual commercial products is often perceived as annoying. Today, more and more companies have realized that sound can be an important component of product attributes and image. They are interested in having acoustic guidelines ...
2008

Sender-Based Message Logging

Willy Zwaenepoel

Sender-based message logging, a low-overhead mechanism for providing transparent fault-tolerance in distributed systems, is described. It differs from conventional message logging mechanisms in that each message is logged in volatile memory on the machine ...
1987

Graph Chatbot

Chattez avec Graph Search

Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.

AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.