La lecture à portée de main
Editeur
Suivre pefav
Documents
Optimizing Costly Functions with Simple Constraints: A Limited Memory Projected Quasi Newton Algorithm
Newton Algorithm
Documents
Cours
Optimizing Costly Functions with Simple Constraints: A Limited Memory Projected Quasi Newton Algorithm
Newton Algorithm
86 pages
English
Documents
Deterministic vs Stochastic Optimization Convergence Rates of Gradient Methods
Michael Friedlander1
Documents
Cours
Deterministic vs Stochastic Optimization Convergence Rates of Gradient Methods
Michael Friedlander1
90 pages
English
Documents
Modeling Discrete Interventional Data using Directed Cyclic Graphical Models
Documents
Cours
Modeling Discrete Interventional Data using Directed Cyclic Graphical Models
84 pages
English
Documents
Graphical Model Structure Learning with Regularization
Mark Schmidt
Documents
Cours
Graphical Model Structure Learning with Regularization
Mark Schmidt
101 pages
English
Documents
Autour d'un resultat elementaire
Documents
Introduction Previous work Our contribution Conclusion
Jean - Sebastien Coron
Documents
Education
Introduction Previous work Our contribution Conclusion
Jean - Sebastien Coron
60 pages
Documents
Schéma de Picard et courbes elliptiques
David Madore
Documents
Education
Schéma de Picard et courbes elliptiques
David Madore
6 pages
Français
Documents
Introduction RSA Cryptanalysis Hashing to Elliptic Curves Conclusion
Mehdi Tibouchi
Documents
Cours
Introduction RSA Cryptanalysis Hashing to Elliptic Curves Conclusion
Mehdi Tibouchi
162 pages
English
Documents
Constru tion d'un modèle semi stable pour ertaines
Documents
Context Our Contribution Conclusion
Jean - Sebastien Coron1
Documents
Education
Context Our Contribution Conclusion
Jean - Sebastien Coron1
75 pages
English
Documents
Context Single User Setting Multi User Setting Conclusion
Aurelie Bauer1
Documents
Education
Context Single User Setting Multi User Setting Conclusion
Aurelie Bauer1
77 pages
Documents
Introduction Modulus fault attacks Experiments and refinements Conclusion
Eric Brier1
Documents
Education
Introduction Modulus fault attacks Experiments and refinements Conclusion
Eric Brier1
93 pages
English
Documents
Introduction Our Proof Conclusion
Pierre-Alain Fouque
Documents
Education
Introduction Our Proof Conclusion
Pierre-Alain Fouque
79 pages
English
Documents
Context Our Contribution Conclusion
Jean - Sebastien Coron1
Documents
Education
Context Our Contribution Conclusion
Jean - Sebastien Coron1
73 pages
English
Documents
Context Our contribution Conclusion
Jean - Sebastien Coron1
Documents
Education
Context Our contribution Conclusion
Jean - Sebastien Coron1
23 pages
English
Documents
Context Lyubashevsky and Micciancio's Paper Conclusion
Vladimir Lyubashevsky
Documents
Education
Context Lyubashevsky and Micciancio's Paper Conclusion
Vladimir Lyubashevsky
63 pages
English
Documents
Introduction to the Lattice Crypto Day
Documents
Introduction Our Contribution Outlook and Conclusion
Pierre-Alain Fouque
Documents
Education
Introduction Our Contribution Outlook and Conclusion
Pierre-Alain Fouque
20 pages
English
Documents
Short signatures in the random oracle model
Louis Granboulan
Documents
Annales d’examens et concours
Short signatures in the random oracle model
Louis Granboulan
17 pages
English
Documents
Context Our Contribution Conclusion
Eric Brier1
Documents
Project Number IST
Documents
Introduction Indirect approach Direct approach Lessons learned
Bruno Blanchet
Documents
Education
Introduction Indirect approach Direct approach Lessons learned
Bruno Blanchet
11 pages
English
Documents
Using Horn Clauses for Analyzing Security Protocols
Bruno Blanchet
Documents
Cours
Using Horn Clauses for Analyzing Security Protocols
Bruno Blanchet
25 pages
English
Documents
Julien Bertrane Departement d'Informatique
Julien Bertrane Departement
Documents
Education
Julien Bertrane Departement d'Informatique
Julien Bertrane Departement
10 pages
English
Documents
Introduction Passive Soundness Adaptive Soundness Selective Decryption Conclusion
Laurent Mazaré
Documents
Education
Introduction Passive Soundness Adaptive Soundness Selective Decryption Conclusion
Laurent Mazaré
59 pages
Documents
Motivation The CryptoVerif input language Language annotations Code generation Conclusion
David Cade
Documents
Education
Motivation The CryptoVerif input language Language annotations Code generation Conclusion
David Cade
20 pages
English
Documents
Introduction Symbolic and computational models Soundness theorem Conclusion
Mathieu Baudet
Documents
Education
Introduction Symbolic and computational models Soundness theorem Conclusion
Mathieu Baudet
26 pages
English
Documents
Static Analysis by Abstract Interpretation of the Quasi Synchronous Composition of
Julien Bertrane
Documents
Travaux de classe
Static Analysis by Abstract Interpretation of the Quasi Synchronous Composition of
Julien Bertrane
45 pages
English
Documents
Proving computational security using Avispa
Véronique Cortier
Documents
Education
Proving computational security using Avispa
Véronique Cortier
14 pages
English
Documents
Solutions des Exercices du cours de Theorie de l'Information et Codage cours du fevrier
Documents
Travaux de classe
Solutions des Exercices du cours de Theorie de l'Information et Codage cours du fevrier
4 pages
Français