Results 81 to 90 of about 6,104 (190)

Implementing RLWE-based Schemes Using an RSA Co-Processor

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
We repurpose existing RSA/ECC co-processors for (ideal) lattice-based cryptography by exploiting the availability of fast long integer multiplication.
Martin R. Albrecht   +5 more
doaj   +1 more source

A bootstrap view on dickey-fuller control charts for AR(1) series [PDF]

open access: yes
Dickey-Fuller control charts aim at monitoring a random walk until a given time horizon to detect stationarity as early as possible. That problem appears in many fields, especially in econometrics and the analysis of economic equilibria.
Steland, Ansgar
core  

City managers matter in how cities engage with their citizens [PDF]

open access: yes, 2017
Social media and other online innovations allow city managers to engage with their citizenry in new - and often relatively inexpensive - ways. But why have some cities embraced and adopted these technologies while others have lagged behind?
Feeney, Mary K., Zhang, Fengxiu
core  

Local bilinear multiple-output quantile/depth regression

open access: yes, 2015
A new quantile regression concept, based on a directional version of Koenker and Bassett's traditional single-output one, has been introduced in [Ann. Statist. (2010) 38 635-669] for multiple-output location/linear regression problems.
Hallin, Marc   +3 more
core   +1 more source

Sur la longueur des mots de rang donné d'un automate fini [PDF]

open access: yes, 1977
Let A be a finite automaton with n states. We prove that if there exists a word of rank ? (n-k) in A, then there exists such a word with length ?
Pin, Jean-Eric
core   +2 more sources

Palindromic closures using multiple antimorphisms

open access: yes, 2013
Generalized pseudostandard word $\bf u$, as introduced in 2006 by de Luca and De Luca, is given by a directive sequence of letters from an alphabet ${\cal A}$ and by a directive sequence of involutory antimorphisms acting on ${\cal A}^*$.
Jajcayová, Tatiana   +2 more
core   +1 more source

Durchmusterung. Wieners Himmel [PDF]

open access: yes, 2006
Norbert Wieners >Cybernetics> von 1948 geht aus von einem Vergleich zählender, durchmusternder Astronomie mit der neuen, statistikbasierten Meteorologie.
Bergermann, Ulrike
core   +1 more source

A Better Kyber Butterfly for FPGAs

open access: yes2024 34th International Conference on Field-Programmable Logic and Applications (FPL)
Kyber was selected by NIST as a Post-Quantum Cryptography Key Encapsulation Mechanism standard. This means that the industry now needs to transition and adopt these new standards. One of the most demanding operations in Kyber is the modular arithmetic, making it a suitable target for optimization.
Bertels, Jonas   +2 more
openaire   +2 more sources

Persistence, Adaptation and Diversity [PDF]

open access: yes, 2005
Traditions aren\u27t static. They change and adapt over time to various circumstances. Cultures and identities are always evolving. It\u27s instructive to look at what aspects of cultures and identities persist over time and what aspects of other ...
Juhasz, Joseph   +4 more
core   +2 more sources

The security of Kyber's FO-transform

open access: yes, 2023
In this short note we give another direct proof for the variant of the FO transform used by Kyber in the QROM. At PKC'23 Maram & Xagawa gave the first direct proof which does not require the indirection via FO with explicit rejection, thereby avoiding either a non-tight bound, or the necessity to analyze the failure probability in a new setting ...
Barbosa, Manuel, Hülsing, Andreas
openaire   +1 more source

Home - About - Disclaimer - Privacy