Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Géraud, Rémi"'
This article presents the Quotient Hash Table (QHT) a new data structure for duplicate detection in unbounded streams. QHTs stem from a corrected analysis of streaming quotient filters (SQFs), resulting in a 33\% reduction in memory usage for equal p
Externí odkaz:
http://arxiv.org/abs/1901.04358
Autor:
Géraud, Rémi
La sécurité de l’information repose sur la bonne interaction entre différents niveaux d’abstraction : les composants matériels, systèmes d’exploitation, algorithmes, et réseaux de communication. Cependant, protéger ces éléments a un co
Externí odkaz:
http://www.theses.fr/2017PSLEE057/document
Autor:
Atashpendar, Arash, Beunardeau, Marc, Connolly, Aisling, Géraud, Rémi, Mestel, David, Roscoe, A. W., Ryan, Peter Y. A.
A binary string transmitted via a memoryless i.i.d. deletion channel is received as a subsequence of the original input. From this, one obtains a posterior distribution on the channel input, corresponding to a set of candidate supersequences weighted
Externí odkaz:
http://arxiv.org/abs/1802.00703
One of the big challenges in program obfuscation consists in modifying not only the program's straight-line code (SLC) but also the program's control flow graph (CFG). Indeed, if only SLC is modified, the program's CFG can be extracted and analyzed.
Externí odkaz:
http://arxiv.org/abs/1709.08357
We describe a methodology to automatically turn arbitrary ARMv8 programs into alphanumeric executable polymorphic shellcodes. Shellcodes generated in this way can evade detection and bypass filters, broadening the attack surface of ARM-powered device
Externí odkaz:
http://arxiv.org/abs/1608.03415
In this paper we describe a new error-correcting code (ECC) inspired by the Naccache-Stern cryptosystem. While by far less efficient than Turbo codes, the proposed ECC happens to be more efficient than some established ECCs for certain sets of parame
Externí odkaz:
http://arxiv.org/abs/1509.00378
Publikováno v:
Journal of Mathematical Cryptology, Vol 14, Iss 1, Pp 15-24 (2020)
We discuss how to recover a secret bitstring given partial information obtained during a computation over that string, assuming the computation is a deterministic algorithm processing the secret bits sequentially. That abstract situation models certa
Externí odkaz:
https://doaj.org/article/5e292d07eb0a4f6388e5c1a9f335f895
Publikováno v:
Extended abstract to appear in IWSEC 2018. This is the full version. 2018
Extended abstract to appear in IWSEC 2018. This is the full version.; A lot of research has been devoted to the problem of defining and constructing signature schemes with various delegation properties. They mostly fit into two families. On the one h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::39b30db2ca7eff001479704a481e65da
https://hal.archives-ouvertes.fr/hal-01814279/file/uws-fullver.pdf
https://hal.archives-ouvertes.fr/hal-01814279/file/uws-fullver.pdf
Autor:
Géraud, Rémi
Publikováno v:
Proceedings du 4e colloque international du CIST
CIST2018-Représenter les territoires / Representing territories
CIST2018-Représenter les territoires / Representing territories, Collège international des sciences territoriales (CIST), Mar 2018, Rouen, France. pp.130-137
CIST2018-Représenter les territoires / Representing territories
CIST2018-Représenter les territoires / Representing territories, Collège international des sciences territoriales (CIST), Mar 2018, Rouen, France. pp.130-137
One usually describes cyberspace as a virtual realm. In truth, it is grounded in real infrastruc-tures, which therefore inherit local regulations and broader geopolitical influences from the location where they are set up. The consequences of this at
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::09bb8626bdff1784590a9cd542902395
https://hal.science/hal-01854506
https://hal.science/hal-01854506
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.