We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Linear Space Data Structures for Finite Groups with Constant Query-Time

    A finite group of order n can be represented by its Cayley table. In the word-RAM model the Cayley table of a group of order n can be stored using ...

    Bireswar Das, Anant Kumar, ... Dhara Thakkar in Algorithmica
    Article 11 March 2024
  2. Group Testing in Arbitrary Hypergraphs and Related Combinatorial Structures

    We consider a generalization of group testing where the potentially contaminated sets are the members of a given hypergraph...
    Conference paper 2024
  3. Lagrangian Trajectories and Closure Models in Mixed Quantum-Classical Dynamics

    Mixed quantum-classical models have been proposed in several contexts to overcome the computational challenges of fully quantum approaches. However,...
    Cesare Tronci, François Gay-Balmaz in Geometric Science of Information
    Conference paper 2023
  4. Sequences with ideal auto-correlation derived from group actions

    Bent functions have a number of practical applications in cryptography, coding theory, and other fields. Fourier transform is a key tool to study...

    Hongyang **ao, **wang Cao in Cryptography and Communications
    Article 22 March 2024
  5. Uncertainty Modeling for Group Re-Identification

    Group re-identification (GReID) aims to correctly associate images containing the same group members captured with non-overlap** camera networks,...

    Quan Zhang, Jianhuang Lai, ... **aohua **e in International Journal of Computer Vision
    Article 01 March 2024
  6. Updatable Encryption from Group Actions

    Updatable Encryption (UE) allows to rotate the encryption key in the outsourced storage setting while minimizing the bandwith used. The server can...
    Antonin Leroux, Maxime Roméas in Post-Quantum Cryptography
    Conference paper 2024
  7. Cutting the GRASS: Threshold GRoup Action Signature Schemes

    Group actions are fundamental mathematical tools, with a long history of use in cryptography. Indeed, the action of finite groups at the basis of the...
    Michele Battagliola, Giacomo Borin, ... Edoardo Persichetti in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  8. Improved parallel finite element methods for the stationary Navier–Stokes problem

    In this study, two improved parallel finite element algorithms based on two-grid strategies are developed to approximate the stationary Navier–Stokes...

    Guangzhi Du, Liyun Zuo in Numerical Algorithms
    Article 15 January 2024
  9. Results on the Key Space of Group-Ring NTRU: The Case of the Dihedral Group

    NTRU-like schemes are among the most studied lattice-based cryptosystems. Since the first scheme was introduced, many variants of NTRU have been...
    Ali Raya, Vikas Kumar, ... Aditi Kar Gangopadhyay in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  10. Generic Models for Group Actions

    We define the Generic Group Action Model (GGAM), an adaptation of the Generic Group Model to the setting of group actions (such as CSIDH). Compared...
    Julien Duman, Dominik Hartmann, ... Doreen Riepel in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  11. Solving systems of algebraic equations over finite commutative rings and applications

    Several problems in algebraic geometry and coding theory over finite rings are modeled by systems of algebraic equations. Among these problems, we...

    Hermann Tchatchiem Kamche, Hervé Talé Kalachi in Applicable Algebra in Engineering, Communication and Computing
    Article Open access 24 April 2024
  12. Abelian and consta-Abelian polyadic codes over affine algebras with a finite commutative chain coefficient ring

    This paper studies Abelian and consta-Abelian polyadic codes over rings defined as affine algebras over chain rings. For this purpose, we use the...

    Gülsüm Gözde Yılmazgüç, Javier de la Cruz, Edgar Martínez-Moro in Cryptography and Communications
    Article Open access 15 March 2024
  13. Classification of spinal curvature types using radiography images: deep learning versus classical methods

    Scoliosis is a spinal abnormality that has two types of curves (C-shaped or S-shaped). The vertebrae of the spine reach an equilibrium at different...

    Parisa Tavana, Mahdi Akraminia, ... Abolfazl Bagherifard in Artificial Intelligence Review
    Article 10 April 2023
  14. Time-Optimal Design of Finite Field Arithmetic for SIKE on Cortex-M4

    The advances in quantum technologies and the fast move toward quantum computing are threatening classical cryptography and urge the deployment of...
    Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani in Information Security Applications
    Conference paper 2023
  15. An overview of consensus models for group decision-making and group recommender systems

    Group decision-making processes can be supported by group recommender systems that help groups of users obtain satisfying decision outcomes. These...

    Thi Ngoc Trang Tran, Alexander Felfernig, Viet Man Le in User Modeling and User-Adapted Interaction
    Article Open access 22 September 2023
  16. Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields

    Consider the problem of efficiently evaluating isogenies $$\phi : \mathcal...
    Gustavo Banegas, Valerie Gilchrist, ... Benjamin Smith in Progress in Cryptology – LATINCRYPT 2023
    Conference paper 2023
  17. Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability

    Verifiable random functions ( VRFs )  are essentially pseudorandom functions for which selected outputs can be proved correct and unique, without...
    Chris Peikert, Jiayu Xu in Topics in Cryptology – CT-RSA 2023
    Conference paper 2023
  18. An Efficient Strong Asymmetric PAKE Compiler Instantiable from Group Actions

    Password-authenticated key exchange (PAKE) is a class of protocols enabling two parties to convert a shared (possibly low-entropy) password into a...
    Conference paper 2023
Did you find what you were looking for? Share feedback.