We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 450 results
  1. Hulls of cyclic codes with respect to the regular permutation inner product

    In this paper, we introduce regular permutation inner products which contain the Euclidean inner product. And we generalize some properties of the...

    **aoshan Quan, Qin Yue, Fuqing Sun in Designs, Codes and Cryptography
    Article 15 July 2024
  2. Regular Memory Structures and Operation Domains of Intelligent Systems

    Abstract

    The concept of a regular memory area for an intelligent system (IS) is considered. The formalized description of the memory of a separate IS...

    Article 01 December 2023
  3. Special LCD codes from products of graphs

    We examine the binary codes from the adjacency matrices of various products of graphs, and show that if the binary codes of a set of graphs have the...

    Article 25 June 2021
  4. Self-dual bent sequences for complex Hadamard matrices

    A new notion of bent sequence related to Hadamard matrices was introduced recently, motivated by a security application (Solé et al. 2021). In this...

    Minjia Shi, Yaya Li, ... Patrick Solé in Designs, Codes and Cryptography
    Article 15 December 2022
  5. Properties of Lattice Isomorphism as a Cryptographic Group Action

    In recent years, the Lattice Isomorphism Problem (LIP) has served as an underlying assumption to construct quantum-resistant cryptographic...
    Benjamin Benčina, Alessandro Budroni, ... Mukul Kulkarni in Post-Quantum Cryptography
    Conference paper 2024
  6. On Projections to Linear Subspaces

    The merit of projecting data onto linear subspaces is well known from, e.g., dimension reduction. One key aspect of subspace projections, the maximum...
    Erik Thordsen, Erich Schubert in Similarity Search and Applications
    Conference paper 2022
  7. Unsupervised non-rigid point cloud registration based on point-wise displacement learning

    Registration of deformable objects is a fundamental prerequisite for many modern virtual reality and computer vision applications. However, due to...

    Yiqi Wu, Fang Han, ... Yilin Chen in Multimedia Tools and Applications
    Article 19 September 2023
  8. Asymptotic Analysis of Regular Sequences

    In this article, q -regular sequences in the sense of Allouche and Shallit are analysed asymptotically. It is shown that the summatory function of a...

    Clemens Heuberger, Daniel Krenn in Algorithmica
    Article Open access 25 October 2019
  9. Frames over finite fields and self-dual codes

    Modular strongly regular graphs have been introduced by Greaves et al. (Linear Algebra Appl 639:50–80, 2022). We show that a related class of isodual...

    Minjia Shi, Yingying Liu, ... Patrick Solé in Applicable Algebra in Engineering, Communication and Computing
    Article 25 October 2023
  10. DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties

    Private Stream Aggregation (PSA) schemes are efficient protocols for distributed data analytics. In a PSA scheme, a set of data producers can encrypt...
    Joakim Brorsson, Martin Gunnarsson in Secure IT Systems
    Conference paper 2024
  11. Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General

    We present a much-improved practical protocol, based on the hardness of Module-SIS and Module-LWE problems, for proving knowledge of a short vector...
    Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plançon in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  12. The Data Encryption Standard (DES) and Alternatives

    The Data Encryption Standard, or DES, was conceived in the early 1970s and can arguably be considered the first modern encryption algorithm. It was...
    Christof Paar, Jan Pelzl, Tim Güneysu in Understanding Cryptography
    Chapter 2024
  13. MDS codes with l-Galois hulls of arbitrary dimensions

    The hull of a linear code is defined to be the intersection of the code and its dual, and was originally introduced to classify finite projective...

    Liqin Qian, **wang Cao, ... Wei Lu in Designs, Codes and Cryptography
    Article 09 March 2024
  14. Optimization of the Storage Location Assignment Problem Using Nested Annealing

    The Storage Location Assignment Problem (SLAP) has a significant impact on the efficiency of warehouse operations. We propose a multi-phase optimizer...
    Johan Oxenstierna, Louis Janse van Rensburg, ... Volker Krueger in Operations Research and Enterprise Systems
    Conference paper 2024
  15. An asymptotic lower bound on the number of bent functions

    V. N. Potapov, A. A. Taranenko, Yu. V. Tarannikov in Designs, Codes and Cryptography
    Article 19 May 2023
  16. Decomposition of a Finite Quantum System into Subsystems: Symbolic–Numerical Approach

    Abstract

    Any Hilbert space with composite dimension can be represented as a tensor product of Hilbert spaces of lower dimensions. This factorization...

    Article 18 July 2022
  17. Moderate Examples

    This chapter is focused on the importance of moderate examples in the learning curve of programming with MATLAB. Situated between basic tutorials and...
    Chapter 2024
  18. The seriation problem in the presence of a double Fiedler value

    Seriation is a problem consisting of seeking the best enumeration order of a set of units whose interrelationship is described by a bipartite graph....

    Anna Concas, Caterina Fenu, ... Raf Vandebril in Numerical Algorithms
    Article 10 December 2022
Did you find what you were looking for? Share feedback.