Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
The identification of kinetic models is an important step for the monitoring, control and optimization of industrial processes. This is particularly the case for highly competitive business sectors such as chemical and pharmaceutical industries, where the ...
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential pa ...
Instances of control systems are presented for which dynamical feedback linearizability can be assessed from differential forms of highest relative degree after some “contact” transformation has been applied. This bypasses the need to find a polynomial dif ...
In this thesis we are interested in the following problem : given two differential k–forms g and f, most of the time they will be assumed closed, on what conditions can we pullback g to f by a map φ ? In other words we ask when it is possible to solve the ...
The contributions of this paper are new 6-round impossible-differential (ID) and 9.75-round known-key distinguishers for the 3D block cipher. The former was constructed using the miss-in-the-middle technique, while the latter with an inside-out technique. ...
This paper presents the first independent and systematic lin- ear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at constrained devices such as RFID tags and sensor networks. Our contributions include ...
In this paper we present a new statistical cryptanalytic technique that we call improbable differential cryptanalysis which uses a differential that is less probable when the correct key is used. We provide data complexity estimates for this kind of attack ...
We investigate the axial phase evolution of light emerging from microstructures. The high-resolution interference microscope (HRIM) allows to record three-dimensional (3D) phase distributions in differential and propagation modes along the longitudinal dir ...
In Control System Theory, the study of continuous-time, finite dimensional, underdetermined systems of ordinary differential equations is an important topic. Classification of systems in different categories is a natural initial step to the analysis of a g ...
We introduce a new class of wavelets that behave like a given differential operator L. Our construction is inspired by the derivative-like behavior of classical wavelets. Within our framework, the wavelet coefficients of a signal y are the samples of a smo ...