The security of the birational permutation signature schemes
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
It is well-known that for any integral domain R, the Serre conjecture ring R(X), i.e., the localization of the univariate polynomial ring R[X] at monic polynomials, is a Bezout domain of Krull dimension
In high energy physics, semiconductor-based sensors are widely used in particle tracking applications. These sensors are typically glued on low-mass cooling substrates, which guarantee the correct thermal management and, at the same time, minimise their in ...
Because building-integrated photovoltaic (BIPV) modules are fully integrated into a building envelope, the back of the module can be exposed to little or no ventilation, resulting in increased operating temperatures. As the temperature increases, the perfo ...
Modular robotics link the reliability of a centralised system with the adaptivity of a decentralised system. It is difficult for a robot with a fixed shape to be able to perform many different types of tasks. As the task space grows, the number of function ...
Let K be an algebraically closed field of characteristic zero, and let G be a connected reductive algebraic group over K. We address the problem of classifying triples (G, H, V ), where H is a proper connected subgroup of G, and V is a finitedimensional ir ...
Commitment is a key primitive which resides at the heart of several cryptographic protocols. Noisy channels can help realize information-theoretically secure commitment schemes; however, their imprecise statistical characterization can severely impair such ...
This study explores the differences in performance and results by various versions of the ISORROPIA thermodynamic module implemented within the ECHAM/MESSy Atmospheric Chemistry (EMAC) model. Three different versions of the module were used, ISORROPIA II v ...
A correspondence functor is a functor from the category of finite sets and correspondences to the category of k-modules, where k is a commutative ring. By means of a suitably defined duality, new correspondence functors are constructed, having remarkable p ...
We examine the moments of the number of lattice points in a fixed ball of volume V for lattices in Euclidean space which are modules over the ring of integers of a number field K. In particular, denoting by ωK the number of roots of unity in K, we ...
The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a polynomial-time key-recovery attack. While some countermeasures have been proposed, th ...