We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 3,899 results
  1. The connection between quadratic bent–negabent functions and the Kerdock code

    In this paper we prove that all bent functions in the Kerdock code, except for the coset of the symmetric quadratic bent function, are bent–negabent....

    Pantelimon Stănică, Bimal Mandal, Subhamoy Maitra in Applicable Algebra in Engineering, Communication and Computing
    Article 31 January 2019
  2. Further study on the maximum number of bent components of vectorial functions

    In 2018, Pott et al. have studied in (IEEE Trans Inf Theory 64(1):403-411, 2018) the maximum number of bent components of vectorial functions. They...

    Sihem Mesnager, Fengrong Zhang, ... Yong Zhou in Designs, Codes and Cryptography
    Article 10 May 2019
  3. A new lower bound on the second-order nonlinearity of a class of monomial bent functions

    The second-order nonlinearity can provide knowledge on classes of Boolean functions used in symmetric-key cryptosystems, coding theory, and Gowers...

    Deng Tang, Haode Yan, ... **aosong Zhang in Cryptography and Communications
    Article 11 May 2019
  4. ChrSNet: Chromosome Straightening Using Self-attention Guided Networks

    Karyoty** is an important procedure to assess the possible existence of chromosomal abnormalities. However, because of the non-rigid nature,...
    Conference paper 2022
  5. Hyper-bent Boolean Functions and Evolutionary Algorithms

    Bent Boolean functions play an important role in the design of secure symmetric ciphers, since they achieve the maximum distance from affine...
    Luca Mariot, Domagoj Jakobovic, ... Stjepan Picek in Genetic Programming
    Conference paper 2019
  6. Soft Humanoid Hand with C-Shaped joint and Granular-Jamming Palm

    In this paper, we propose a soft humanoid hand with a C-shaped joint and granular-jamming palm. The C-shaped joint with spring steel strip has low...
    Haoxian Zheng, Bin Fang, ... Fuchun Sun in Intelligent Robotics and Applications
    Conference paper 2023
  7. L-TReiD: Logic Tensor Transformer for Re-identification

    This article proposes a Neuro-Symbolic (NeSy) machine learning approach to Object Re-identification. NeSy is an emerging branch of artificial...
    Russo Alessandro, Manigrasso Francesco, ... Morra Lia in Advances in Visual Computing
    Conference paper 2023
  8. Screen space indirect lighting with visibility bitmask

    Horizon-based indirect illumination efficiently estimates a diffuse light bounce in screen space by analytically integrating the horizon angle...

    Olivier Therrien, Yannick Levesque, Guillaume Gilet in The Visual Computer
    Article 11 November 2022
  9. Mixed reality and sensor real-time feedback to increase muscle engagement during deep core exercising

    In lower extremity amputee rehabilitation programs, difficult-to-master targeted activation of deep core muscles and pursed-lip breathing training...

    L. Lancere, M. Jürgen, H. Gapeyeva in Virtual Reality
    Article Open access 04 January 2023
  10. Gait design and experimental validation of a snake robot on a pipe with branches using spiral stairs function

    This paper presents the gait design and experimental validation of a snake robot on a pipe with branches. The target posture of the robot is designed...

    Mizuki Nakajima, Qi Cheng, Motoyasu Tanaka in Artificial Life and Robotics
    Article 10 March 2022
  11. Boolean Functions with a Few Walsh Transform Values

    Boolean functions have been extensively studied in coding theory, cryptography, sequence design and graph theory. By adding two products of three...
    Wengang **, **aoni Du, ... Yanzhong Sun in Advances in Artificial Intelligence and Security
    Conference paper 2021
  12. A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption

    Goh and Jarecki (Eurocrypt 2003) showed how to get a signature scheme from the computational Diffie-Hellman assumption, and they introduced the name...
    Benoît Chevallier-Mames in Topics in Cryptology – CT-RSA 2022
    Conference paper 2022
  13. Exploring Lightweight S-boxes Using Cellular Automata and Reinforcement Learning

    The most important elements of block ciphers are nonlinear functions known as substitution boxes (S-boxes). S-boxes with weak cryptographic...
    Tarun Ayyagari, Anirudh Saji, ... Jimmy Jose in Cellular Automata
    Conference paper 2022
  14. Combinatorial t-designs from special functions

    A special function is a function either of special form or with a special property. Special functions have interesting applications in coding theory...

    Cunsheng Ding, Chunming Tang in Cryptography and Communications
    Article 18 June 2020
  15. Image sets of perfectly nonlinear maps

    We consider image sets of differentially d -uniform maps of finite fields. We present a lower bound on the image size of such maps and study their...

    Lukas Kölsch, Björn Kriepke, Gohar M. Kyureghyan in Designs, Codes and Cryptography
    Article Open access 09 August 2022
  16. Shifted plateaued functions and their differential properties

    Nurdagül Anbar, Canan Kaşıkçı, ... Alev Topuzoğlu in Cryptography and Communications
    Article 23 March 2020
  17. Modified Patterson–Wiedemann construction

    The Patterson–Wiedemann (PW) construction, which is defined for an odd number n of variables with n being the product of two distinct prime numbers p ...

    Article 24 May 2023
  18. Boolean functions with six-valued Walsh spectra and their application

    Boolean functions play an important role in coding theory and symmetric cryptography. In this paper, three classes of Boolean functions with...

    Wengang **, **aoni Du, ... Cuiling Fan in Cryptography and Communications
    Article 17 April 2021
  19. Structure guided network for human pose estimation

    Humans have an impressive ability to reliably perceive pose with semantic descriptions (e.g. both arm up or left leg bent). To leverage the...

    Yilei Chen, Xuemei **e, ... Fu Li in Applied Intelligence
    Article 09 May 2023
  20. An Improved Whale Optimization Algorithm Combined with Bat Algorithm and Its Applications

    The whale optimization algorithm(WOA) is inspired by the hunting behavior of humpback whales. Due to its good effect in searching for optimal...
    **aofeng Wang, Jian’ou Wang, Chanjuan Lin in Intelligence Computation and Applications
    Conference paper 2024
Did you find what you were looking for? Share feedback.