Search
Search Results
-
The Exact Multi-user Security of 2-Key Triple DES
We study the tight multi-user (mu) security of 2-key triple encryption (2kTE) with its application to 2-key TDES. With an n-bit block and k-bit key... -
Provably Secure Reflection Ciphers
This paper provides the first analysis of reflection ciphers such as Prince from a provable security viewpoint. As a first contribution, we initiate... -
Cryptanalytic Time–Memory–Data Trade-offs for FX-Constructions and the Affine Equivalence Problem
The FX-construction was proposed in 1996 by Kilian and Rogaway as a generalization of the DESX scheme. The construction increases the security of an n ...
-
Generic Attack on Iterated Tweakable FX Constructions
Tweakable block ciphers are increasingly becoming a common primitive to build new resilient modes as well as a concept for multiple dedicated... -
Deep Heterogeneous AutoML Trend Prediction Model for Algorithmic Trading in the USD/COP Colombian FX Market Through Limit Order Book (LOB)
This study presents a novel and competitive approach for algorithmic trading in the Colombian US dollar inter-bank market (SET-FX). At the core of...
-
Multisets and Distributions
We give a lightweight alternative construction of Jacobs’s distributive law for multisets and distributions that does not involve any combinatorics.... -
An Algorithmic Trading Strategy for the Colombian US Dollar Inter-bank Bulk Market SET-FX Based on an Evolutionary TPOT AutoML Predictive Model
In this paper, we introduce a competitive algorithmic trading strategy for the Colombian US dollar inter-bank bulk order-driven market, SET-FX. The... -
Dynamic interaction-based feature selection algorithm for maximal relevance minimal redundancy
In feature selection, distinguishing the redundancy and dependency relationships between features is a challenging task. In recent years, scholars...
-
Improved kernels for triangle packing in tournaments
Triangle packing problem has been paid lots of attention to in the literature. In this paper, we study the kernelization of the triangle packing...
-
Comparison of outline-based shape descriptors for alphanumeric characters by using piecewise linear functions: the case of vehicle license plates typeface
The selection of a suitable shape representation model is an essential component to consider in order to achieve satisfactory results in shape...
-
Visual Nodes
We use the notion visual node to draw a distinction between container nodes, which are used to group and lay out a couple of child nodes, and such... -
Optimizing Product-Line Architectures with MOA4PLA
One of the main core assets of a software product line (SPL) is the product-line architecture (PLA). PLA design can be modeled as a multi-objective... -
Finite-time stabilization of nonlocal Lipschitzian stochastic time-varying nonlinear systems with Markovian switching
In this study, we investigate the stochastic finite-time stability theory and finite-time stabilization of stochastic time-varying nonlinear systems...
-
Generation of Arabic Commonsense Explanations
Generating natural language explanations is a challenging task in natural language processing (NLP). With recent advancements in deep learning and... -
Improving Programming Education Based on Programming Contest Problems: The Algorithm Implementation for the Constructive Proof of Euler Graph
“Set and Graph Theory” is the theoretical foundation for computer science and technology. We construct joint experimental curriculums for set and... -
Unit middleware for implementation of human–machine interconnection intelligent ecology construction
General speech recognition models require large capacity and strong computing power. Based on small capacity and low computing power to realize...
-
Multimodal medical volumetric image fusion using 3-D Shearlet transform and T-S fuzzy reasoning
Multimodal medical volumetric image fusion is a hot topic in medical image processing. Currently, most multi-scale based medical image fusion methods...
-
Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes
In this paper, we report the first quantum key-recovery attack on a symmetric block cipher design, using classical queries only, with a more than... -
Probability theory
Descriptive statistics are concerned with the investigation of a sample that is usually limited in size. A key benefit is that these investigations...