Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Skipjack is a block cipher designed by the NSA for use in US government phones, and commercial mobile and wireless products by ATT. Among its initial implementations in hardware were the Clipper chip and Fortezza PC cards, which have since influenced the p ...
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is arguably a serious candidate for selection as SHA-3. This paper presents the first third-party analysis of Skein, with an extensive study of its main componen ...
The contributions of this paper are new 6-round impossible-differential (ID) and 9.75-round known-key distinguishers for the 3D block cipher. The former was constructed using the miss-in-the-middle technique, while the latter with an inside-out technique. ...
We show how the theory of deformations of geometric structures (development and holonomy) applied to the case of piecewise flat surfaces leads to some interesting geometric structures on the moduli space of a punctured surface. ...
A simple approach to the realisation of a differential Colpitts oscillator is to connect the grounded capacitor in the feedback network of two single-ended Colpitts oscillators together in series. As the output signals are expected to be differential, it i ...
We explore an approach to 3D people tracking with learned motion models and deterministic optimization. The tracking problem is formulated as the minimization of a differ- entiable criterion whose differential structure is rich enough for optimization to b ...
Let M be a monoidal category endowed with a distinguished class of weak equivalences and with appropriately compatible classifying bundles for monoids and comonoids. We define and study homotopy-invariant notions of normality for maps of monoids and of con ...
is paper presents a voltage-to-current converter as a current-mode output buffering stage for sensor interfaces. The converter can be used in any microsystem needing a current output. It is presented here in the context of a Hall sensor microsystem. The sy ...
This paper presents the first independent and systematic lin- ear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at constrained devices such as RFID tags and sensor networks. Our contributions include ...
In this work, we propose new ways to learn pose and motion priors models and show that they can be used to increase the performance of 3D body tracking algorithms, resulting in very realistic motions under very challenging conditions. We first explored an ...