Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Valérie Gauthier-Umaña"'
Publikováno v:
International Journal of Information Management Data Insights, Vol 4, Iss 2, Pp 100290- (2024)
Industry 4.0 technologies have created the opportunity to overcome inefficiencies along the supply chain by offering data transparency, tracing, and security. In this regard, the role of blockchain technology has garnered a lot of attention among pra
Externí odkaz:
https://doaj.org/article/cec45bede8b54781a17685442431a4f1
Publikováno v:
H2D|Revista de Humanidades Digitais. 2
Mathematics has traditionally been blamed for being one of the preponderant factors that explains students’ dropout in universities. This assessment may seem rather violent; however, it is not so far from reality. We miss aspects related to empathy
Autor:
Valérie Gauthier-Umaña
Publikováno v:
Voces diversas y disruptivas en tiempos de Revolución 4.0
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3a644cc0ddcb65beea3594329167d2a7
https://doi.org/10.2307/j.ctv123x566.12
https://doi.org/10.2307/j.ctv123x566.12
Publikováno v:
Voces diversas y disruptivas en tiempos de Revolución 4.0
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8917ee25cd7644f9e0a0ebced0e98342
https://doi.org/10.2307/j.ctv123x566.15
https://doi.org/10.2307/j.ctv123x566.15
Autor:
Jorge Ramió Aguirre, Rafael Alberto Méndez-Romero, Jeimy J. Cano M., Luis Enrique Sánchez Crespo, Valérie Gauthier-Umaña
Este libro es producto de la investigacion de tesis doctoral que se realiza en la ciudad de Buenos Aires desde el ano 2011 en la Facultad Latinoamericana de Ciencias Sociales (flacso) y se enmarca en el Doctorado en Ciencias Sociales de dicha institu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eede38162c477705ade7342994794aa4
https://doi.org/10.12804/si9789587844337
https://doi.org/10.12804/si9789587844337
Editorial: Las ciencias naturales y su difusion: Maria Magdalena Martinez Aguero/Al encuentro con: Una mirada al programa de Matematicas Aplicadas y Ciencias de la Computacion: Valerie Gauthier Umana/ Los biologos rosaristas estan listos para enfrent
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d295d280f7a7daf13aff0f703dd26c18
https://doi.org/10.12804/issne.2382-3135_10336.20611_teur
https://doi.org/10.12804/issne.2382-3135_10336.20611_teur
This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selec
Publikováno v:
Repositorio EdocUR-U. Rosario
Universidad del Rosario
instacron:Universidad del Rosario
Universidad del Rosario
instacron:Universidad del Rosario
We define a statistical measure of the typical size of short words in a linear code over a finite field. We prove that the dual toric codes coming from polytopes of degree one are characterized, among all dual toric codes, by being extremal with resp
Publikováno v:
Repositorio EdocUR-U. Rosario
Universidad del Rosario
instacron:Universidad del Rosario
Designs, Codes and Cryptography
Designs, Codes and Cryptography, Springer Verlag, 2014, 73 (2), pp.641-666. ⟨10.1007/s10623-014-9967-z⟩
International Workshop on Coding and Cryptography-WCC 2013
International Workshop on Coding and Cryptography-WCC 2013, Apr 2013, Bergen, Norway. pp.181-193
Designs, Codes and Cryptography, 2014, 73 (2), pp.641-666. ⟨10.1007/s10623-014-9967-z⟩
Universidad del Rosario
instacron:Universidad del Rosario
Designs, Codes and Cryptography
Designs, Codes and Cryptography, Springer Verlag, 2014, 73 (2), pp.641-666. ⟨10.1007/s10623-014-9967-z⟩
International Workshop on Coding and Cryptography-WCC 2013
International Workshop on Coding and Cryptography-WCC 2013, Apr 2013, Bergen, Norway. pp.181-193
Designs, Codes and Cryptography, 2014, 73 (2), pp.641-666. ⟨10.1007/s10623-014-9967-z⟩
Because of their interesting algebraic properties, several authors promote the use of generalized Reed-Solomon codes in cryptography. Niederreiter was the first to suggest an instantiation of his cryptosystem with them but Sidelnikov and Shestakov sh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::755aa452417ee5528f4639ba0d702eb0
https://repository.urosario.edu.co/handle/10336/23845
https://repository.urosario.edu.co/handle/10336/23845
Autor:
Ludovic Perret, Jean-Pierre Tillich, Jean Charles Faugère, Ayoub Otmani, Valérie Gauthier-Umaña
Publikováno v:
ITW 2011-IEEE Information Theory Workshop
ITW 2011-IEEE Information Theory Workshop, Oct 2011, Paraty, Brazil. pp.282-286, ⟨10.1109/ITW.2011.6089437⟩
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, 2013, 59 (10), pp.6830-6844. ⟨10.1109/TIT.2013.2272036⟩
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2013, 59 (10), pp.6830-6844. ⟨10.1109/TIT.2013.2272036⟩
ITW 2011-IEEE Information Theory Workshop, Oct 2011, Paraty, Brazil. pp.282-286, ⟨10.1109/ITW.2011.6089437⟩
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, 2013, 59 (10), pp.6830-6844. ⟨10.1109/TIT.2013.2272036⟩
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2013, 59 (10), pp.6830-6844. ⟨10.1109/TIT.2013.2272036⟩
International audience; The Goppa Code Distinguishing (GD) problem consists in distinguishing the matrix of a Goppa code from a random matrix. The hardness of this problem is an assumption to prove the security of code-based cryptographic primitives
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eb969e95eb4d2b8af14ef0c0c024a4e7
https://hal.archives-ouvertes.fr/hal-01108602
https://hal.archives-ouvertes.fr/hal-01108602