Results 81 to 90 of about 6,104 (190)
Implementing RLWE-based Schemes Using an RSA Co-Processor
We repurpose existing RSA/ECC co-processors for (ideal) lattice-based cryptography by exploiting the availability of fast long integer multiplication.
Martin R. Albrecht +5 more
doaj +1 more source
A bootstrap view on dickey-fuller control charts for AR(1) series [PDF]
Dickey-Fuller control charts aim at monitoring a random walk until a given time horizon to detect stationarity as early as possible. That problem appears in many fields, especially in econometrics and the analysis of economic equilibria.
Steland, Ansgar
core
City managers matter in how cities engage with their citizens [PDF]
Social media and other online innovations allow city managers to engage with their citizenry in new - and often relatively inexpensive - ways. But why have some cities embraced and adopted these technologies while others have lagged behind?
Feeney, Mary K., Zhang, Fengxiu
core
Local bilinear multiple-output quantile/depth regression
A new quantile regression concept, based on a directional version of Koenker and Bassett's traditional single-output one, has been introduced in [Ann. Statist. (2010) 38 635-669] for multiple-output location/linear regression problems.
Hallin, Marc +3 more
core +1 more source
Sur la longueur des mots de rang donné d'un automate fini [PDF]
Let A be a finite automaton with n states. We prove that if there exists a word of rank ? (n-k) in A, then there exists such a word with length ?
Pin, Jean-Eric
core +2 more sources
Palindromic closures using multiple antimorphisms
Generalized pseudostandard word $\bf u$, as introduced in 2006 by de Luca and De Luca, is given by a directive sequence of letters from an alphabet ${\cal A}$ and by a directive sequence of involutory antimorphisms acting on ${\cal A}^*$.
Jajcayová, Tatiana +2 more
core +1 more source
Durchmusterung. Wieners Himmel [PDF]
Norbert Wieners >Cybernetics> von 1948 geht aus von einem Vergleich zählender, durchmusternder Astronomie mit der neuen, statistikbasierten Meteorologie.
Bergermann, Ulrike
core +1 more source
A Better Kyber Butterfly for FPGAs
Kyber was selected by NIST as a Post-Quantum Cryptography Key Encapsulation Mechanism standard. This means that the industry now needs to transition and adopt these new standards. One of the most demanding operations in Kyber is the modular arithmetic, making it a suitable target for optimization.
Bertels, Jonas +2 more
openaire +2 more sources
Persistence, Adaptation and Diversity [PDF]
Traditions aren\u27t static. They change and adapt over time to various circumstances. Cultures and identities are always evolving. It\u27s instructive to look at what aspects of cultures and identities persist over time and what aspects of other ...
Juhasz, Joseph +4 more
core +2 more sources
The security of Kyber's FO-transform
In this short note we give another direct proof for the variant of the FO transform used by Kyber in the QROM. At PKC'23 Maram & Xagawa gave the first direct proof which does not require the indirection via FO with explicit rejection, thereby avoiding either a non-tight bound, or the necessity to analyze the failure probability in a new setting ...
Barbosa, Manuel, Hülsing, Andreas
openaire +1 more source

