Zobrazeno 1 - 10
of 183
pro vyhledávání: '"VILLA, IRENE"'
Autor:
Villa, Irene, Monguzzi, Angelo, Lorenzi, Roberto, Orfano, Matteo, Babin, Vladimir, Hájek, František, Kuldová, Karla, Kučerková, Romana, Beitlerová, Alena, Mattei, Ilaria, Buresova, Hana, Pjatkan, Radek, Čuba, Václav, Procházková, Lenka Prouzová, Nikl, Martin
Fast emitting polymeric scintillators are requested in advanced applications where high-speed detectors with large signal-to-noise ratio are needed. However, their low density implies a weak stopping power of high energy radiations, thus a limited li
Externí odkaz:
http://arxiv.org/abs/2408.01340
Multivariate Cryptography is one of the main candidates for Post-quantum Cryptography. Multivariate schemes are usually constructed by applying two secret affine invertible transformations $\mathcal S,\mathcal T$ to a set of multivariate polynomials
Externí odkaz:
http://arxiv.org/abs/2405.20968
Dillon observed that an APN function $F$ over $\mathbb{F}_2^{n}$ with $n$ greater than $2$ must satisfy the condition $\{F(x) + F(y) + F(z) + F(x + y + z) \,:\, x,y,z \in\mathbb{F}_2^n\}= \mathbb{F}_2^n$. Recently, Taniguchi (2023) generalized this c
Externí odkaz:
http://arxiv.org/abs/2302.13922
Autor:
Boyd, Joseph, Villa, Irène, Mathieu, Marie-Christine, Deutsch, Eric, Paragios, Nikos, Vakalopoulou, Maria, Christodoulidis, Stergios
In whole slide imaging, commonly used staining techniques based on hematoxylin and eosin (H&E) and immunohistochemistry (IHC) stains accentuate different aspects of the tissue landscape. In the case of detecting metastases, IHC provides a distinct re
Externí odkaz:
http://arxiv.org/abs/2208.12847
In this work, we present two new families of quadratic APN functions. The first one (F1) is constructed via biprojective polynomials. This family includes one of the two APN families introduced by G\"olo\v{g}lu in 2022. Then, following a similar appr
Externí odkaz:
http://arxiv.org/abs/2204.07462
Publikováno v:
Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp 506-22 (2024)
The notion of public-key encryption with keyword search (PEKS) was introduced to search over encrypted data without performing any decryption. In this article, we propose a PEKS scheme in which both the encrypted keyword and the trapdoor are randomiz
Externí odkaz:
https://doaj.org/article/f166e02decb84c07b88e1d5d2d2d4c89
Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and allows learning a function of the encrypted data. In this paper, we review all FE classes, describing their functi
Externí odkaz:
http://arxiv.org/abs/2106.06306
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In Finite Fields and Their Applications June 2023 88
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.