We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 3,487 results
  1. The Exact Multi-user Security of 2-Key Triple DES

    We study the tight multi-user (mu) security of 2-key triple encryption (2kTE) with its application to 2-key TDES. With an n-bit block and k-bit key...
    Yusuke Naito, Yu Sasaki, Takeshi Sugawara in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  2. Provably Secure Reflection Ciphers

    This paper provides the first analysis of reflection ciphers such as Prince from a provable security viewpoint. As a first contribution, we initiate...
    Tim Beyne, Yu Long Chen in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  3. Cryptanalytic Time–Memory–Data Trade-offs for FX-Constructions and the Affine Equivalence Problem

    The FX-construction was proposed in 1996 by Kilian and Rogaway as a generalization of the DESX scheme. The construction increases the security of an n ...

    Itai Dinur in Journal of Cryptology
    Article 13 September 2019
  4. Generic Attack on Iterated Tweakable FX Constructions

    Tweakable block ciphers are increasingly becoming a common primitive to build new resilient modes as well as a concept for multiple dedicated...
    Ferdinand Sibleyras in Topics in Cryptology – CT-RSA 2020
    Conference paper 2020
  5. Deep Heterogeneous AutoML Trend Prediction Model for Algorithmic Trading in the USD/COP Colombian FX Market Through Limit Order Book (LOB)

    This study presents a novel and competitive approach for algorithmic trading in the Colombian US dollar inter-bank market (SET-FX). At the core of...

    Diego Leon, Javier Sandoval, ... Oscar Sierra in SN Computer Science
    Article Open access 10 June 2024
  6. Multisets and Distributions

    We give a lightweight alternative construction of Jacobs’s distributive law for multisets and distributions that does not involve any combinatorics....
    Dexter Kozen, Alexandra Silva in Logics and Type Systems in Theory and Practice
    Chapter 2024
  7. Limits of Preprocessing

    Yuval Filmus, Yuval Ishai, ... Guy Kindler in computational complexity
    Article Open access 23 May 2024
  8. An Algorithmic Trading Strategy for the Colombian US Dollar Inter-bank Bulk Market SET-FX Based on an Evolutionary TPOT AutoML Predictive Model

    In this paper, we introduce a competitive algorithmic trading strategy for the Colombian US dollar inter-bank bulk order-driven market, SET-FX. The...
    Andrea Cruz, Germán Hernández, ... Diego León in Applied Computer Sciences in Engineering
    Conference paper 2023
  9. Dynamic interaction-based feature selection algorithm for maximal relevance minimal redundancy

    In feature selection, distinguishing the redundancy and dependency relationships between features is a challenging task. In recent years, scholars...

    Kexin Yin, Aifeng **e, ... Jianqi Zhu in Applied Intelligence
    Article 03 August 2022
  10. Improved kernels for triangle packing in tournaments

    Triangle packing problem has been paid lots of attention to in the literature. In this paper, we study the kernelization of the triangle packing...

    Hanchun Yuan, Qilong Feng, Jianxin Wang in Science China Information Sciences
    Article 17 April 2023
  11. Comparison of outline-based shape descriptors for alphanumeric characters by using piecewise linear functions: the case of vehicle license plates typeface

    The selection of a suitable shape representation model is an essential component to consider in order to achieve satisfactory results in shape...

    Victor Manuel Jimenez-Fernandez, Victor Manuel Tlapa-Carrera, ... Uriel Antonio Filobello-Nino in Multimedia Tools and Applications
    Article 22 March 2023
  12. Visual Nodes

    We use the notion visual node to draw a distinction between container nodes, which are used to group and lay out a couple of child nodes, and such...
    Chapter 2023
  13. Optimizing Product-Line Architectures with MOA4PLA

    One of the main core assets of a software product line (SPL) is the product-line architecture (PLA). PLA design can be modeled as a multi-objective...
    Thelma Elita Colanzi, Mamoru Massago, Silvia Regina Vergilio in UML-Based Software Product Line Engineering with SMarty
    Chapter 2023
  14. Finite-time stabilization of nonlocal Lipschitzian stochastic time-varying nonlinear systems with Markovian switching

    In this study, we investigate the stochastic finite-time stability theory and finite-time stabilization of stochastic time-varying nonlinear systems...

    Gui-Hua Zhao, Shu-Jun Liu in Science China Information Sciences
    Article 21 October 2022
  15. Generation of Arabic Commonsense Explanations

    Generating natural language explanations is a challenging task in natural language processing (NLP). With recent advancements in deep learning and...
    Mohamed El Ghaly Beheitt, Moez Ben HajHmida in Recent Challenges in Intelligent Information and Database Systems
    Conference paper 2023
  16. Improving Programming Education Based on Programming Contest Problems: The Algorithm Implementation for the Constructive Proof of Euler Graph

    “Set and Graph Theory” is the theoretical foundation for computer science and technology. We construct joint experimental curriculums for set and...
    Conference paper 2024
  17. Unit middleware for implementation of human–machine interconnection intelligent ecology construction

    General speech recognition models require large capacity and strong computing power. Based on small capacity and low computing power to realize...

    Hai-jun Zhang, Ying-hui Chen, Hankui Zhuo in Journal of Big Data
    Article Open access 21 June 2023
  18. Multimodal medical volumetric image fusion using 3-D Shearlet transform and T-S fuzzy reasoning

    Multimodal medical volumetric image fusion is a hot topic in medical image processing. Currently, most multi-scale based medical image fusion methods...

    **aoqing Luo, **nxing **, ... **ao-Jun Wu in Multimedia Tools and Applications
    Article 25 November 2022
  19. Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes

    In this paper, we report the first quantum key-recovery attack on a symmetric block cipher design, using classical queries only, with a more than...
    Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  20. Probability theory

    Descriptive statistics are concerned with the investigation of a sample that is usually limited in size. A key benefit is that these investigations...
    Matthias Plaue in Data Science
    Chapter 2023
Did you find what you were looking for? Share feedback.