Search
Search Results
-
The connection between quadratic bent–negabent functions and the Kerdock code
In this paper we prove that all bent functions in the Kerdock code, except for the coset of the symmetric quadratic bent function, are bent–negabent....
-
Further study on the maximum number of bent components of vectorial functions
In 2018, Pott et al. have studied in (IEEE Trans Inf Theory 64(1):403-411, 2018) the maximum number of bent components of vectorial functions. They...
-
A new lower bound on the second-order nonlinearity of a class of monomial bent functions
The second-order nonlinearity can provide knowledge on classes of Boolean functions used in symmetric-key cryptosystems, coding theory, and Gowers...
-
ChrSNet: Chromosome Straightening Using Self-attention Guided Networks
Karyoty** is an important procedure to assess the possible existence of chromosomal abnormalities. However, because of the non-rigid nature,... -
Hyper-bent Boolean Functions and Evolutionary Algorithms
Bent Boolean functions play an important role in the design of secure symmetric ciphers, since they achieve the maximum distance from affine... -
Soft Humanoid Hand with C-Shaped joint and Granular-Jamming Palm
In this paper, we propose a soft humanoid hand with a C-shaped joint and granular-jamming palm. The C-shaped joint with spring steel strip has low... -
L-TReiD: Logic Tensor Transformer for Re-identification
This article proposes a Neuro-Symbolic (NeSy) machine learning approach to Object Re-identification. NeSy is an emerging branch of artificial... -
Screen space indirect lighting with visibility bitmask
Horizon-based indirect illumination efficiently estimates a diffuse light bounce in screen space by analytically integrating the horizon angle...
-
Mixed reality and sensor real-time feedback to increase muscle engagement during deep core exercising
In lower extremity amputee rehabilitation programs, difficult-to-master targeted activation of deep core muscles and pursed-lip breathing training...
-
Gait design and experimental validation of a snake robot on a pipe with branches using spiral stairs function
This paper presents the gait design and experimental validation of a snake robot on a pipe with branches. The target posture of the robot is designed...
-
Boolean Functions with a Few Walsh Transform Values
Boolean functions have been extensively studied in coding theory, cryptography, sequence design and graph theory. By adding two products of three... -
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption
Goh and Jarecki (Eurocrypt 2003) showed how to get a signature scheme from the computational Diffie-Hellman assumption, and they introduced the name... -
Exploring Lightweight S-boxes Using Cellular Automata and Reinforcement Learning
The most important elements of block ciphers are nonlinear functions known as substitution boxes (S-boxes). S-boxes with weak cryptographic... -
Combinatorial t-designs from special functions
A special function is a function either of special form or with a special property. Special functions have interesting applications in coding theory...
-
Image sets of perfectly nonlinear maps
We consider image sets of differentially d -uniform maps of finite fields. We present a lower bound on the image size of such maps and study their...
-
Modified Patterson–Wiedemann construction
The Patterson–Wiedemann (PW) construction, which is defined for an odd number n of variables with n being the product of two distinct prime numbers p ...
-
Boolean functions with six-valued Walsh spectra and their application
Boolean functions play an important role in coding theory and symmetric cryptography. In this paper, three classes of Boolean functions with...
-
Structure guided network for human pose estimation
Humans have an impressive ability to reliably perceive pose with semantic descriptions (e.g. both arm up or left leg bent). To leverage the...
-
An Improved Whale Optimization Algorithm Combined with Bat Algorithm and Its Applications
The whale optimization algorithm(WOA) is inspired by the hunting behavior of humpback whales. Due to its good effect in searching for optimal...