On the complexity of the Arora-Ge Algorithm against LWE
|
|
- Ellen Eunice Cunningham
- 5 years ago
- Views:
Transcription
1 On the complexity of the Arora-Ge Algorithm against LWE Martin Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret To cite this version: Martin Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret. On the complexity of the Arora-Ge Algorithm against LWE. SCC 2012 Third international conference on Symbolic Computation and Cryptography, Jul 2012, Castro Urdiales, Spain. pp.93-99, 2012, < <hal > HAL Id: hal Submitted on 15 Jan 2013 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 On the complexity of the Arora-Ge Algorithm against LWE Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, and Ludovic Perret Abstract Arora&Ge[5]recentlyshowedthatsolvingLWEcanbereducedtosolveahigh-degree non-linear system of equations. They used a linearization to solve the systems. We investigate here the possibility of using Gröbner bases to improve Arora& Ge approach. Introduction TheLearningWithErrors(LWE)ProblemwasintroducedbyRegevin[27,26]. Itisageneralisation for large primes of the well-known LPN(Learning Parity with Noise) problem. Since its introduction, LWE has become a source of many innovative cryptosystems, such as the oblivious transferprotocolbypeikertetal.[25],acryptosystembyakaviaetal.[1]thatissecureevenif almosttheentiresecretkeyisleaked,homomorphicencryption[21,10,4],etc...reasonsoflwe s success in cryptography include its simplicity as well as convincing theoretical arguments regarding its hardness, i.e. a reduction from(worst-case) assumed hard lattice problems to(average-case) LWE. The purpose of this paper is to investigate whether algebraic techniques(e.g.[16, 17, 18, 19, 3, 2,20])canbeusedinthecontextofLWE.ThisismotivatedbyarecentresultArora&Ge[5]who showed that solving LWE can be reduced to solve a high-degree non-linear system of equations. Learning With Errors WereproducebelowthedefinitionoftheLWEproblemfrom[27,26]. Definition1(LWE). Letn 1bethenumberofvariables,qbeanoddprimeinteger, χbea probabilitydistributionon Z q andsbeasecretvectorin Z n q. WedenotebyL s,χthe (n) probability distributionon Z n q Z qobtainedbychoosinga Z n q atrandom,choosinge Z qaccordingto χ, andreturning (a,c) = (a, a,s +e) Z n q Z q.lweistheproblemoffindings Z n qgivenpairs Z n q Z q sampledaccordingtol (n) s,χ. Themodulusqistypicallytakentobepolynomialinn,and χisthediscretegaussiandistributionon Z q withmean0andstandarddeviation σ = α q,forsome α. TodiscretizetheGaussian distribution N0,σ 2 moduloq,wesampleaccordingto N0,σ 2 androundtothenearestintegermod q.inwhatfollows, χ α,q willthendenotethisdiscretizeddistribution. Atypicalsettingforthestandarddeviation(std)is σ=n ε,with ε,0 ε 1.Forexample,[27] suggestsq n 2 and α=1/( n log 2 n).indeed,assoonas ε 1/2(worst-case)GAPSVP Õ(n/α) reducesto(average-case)lwe 1.Thus,anyalgorithmsolvingLWE(when ε 1/2)canbeusedfor GAPSVP Õ(n/α). We emphasize that it is widely believed that only exponential algorithm exists forsolvinggapsvp Õ(n/α). Recently, Arora& Ge[5] introduced a variant of LWE with structured errors. In this setting, you have given an oracle such that given LWE samples returns polynomials which vanish on the errors. 1 Thereductionisquantumifqispolynomialbutcanbemade[24]classicalifqissuperpolynomial. 93
3 94 WMC&SCC2012 They showed that the(discretized) Gaussian intrinsically induced a structure on the errors. This featurecanbeusedtoreducelwetotheproblemofsolvinganon-linearsystemofmultivariateof equations. Thetotalcomplexity(timeandspace)oftheirapproachis2Õ(n2ε). Itisthensubexponential when ε<1/2,butremainsexponentialwhen ε 1/2.ItisinterestingthatArora&Gereachwitha completely different approach the ε = 1/2 hardness limit advised by Regev[27, 26]. Note that an improvement on Arora&Ge could allow to challenge the subexponetiality of GAPSVP Õ(n/α). Remarkthat[5]useslinearizationtosolvethenon-linearsystem. Itisthen natural to investigate whether more advanced tools, such as Gröbner bases[11, 12, 13], could improve the algorithm of Arora&Ge. Inthisnote,wewillshowthatGröbnerbasescanbringapracticalimprovementonthecomplexityof[5].WealsobrieflydiscusswhetherGröbnerbasescan(orcannot)allowtochangethe complexity class of Arora&Ge. Before that, we need to recall some basic complexity results about Gröbner bases. Gröbner bases Complexity Results Gröbner basis is probably the main tool allowing to solve non-linear system of finite fields. From an algorithmic point of view, Lazard[22] showed that computing the Gröbner basis for a system of polynomialsisequivalenttoperformagaussianeliminationonthemacaulaymatrices[23]m acaulay d,m ford,1 d DforsomeintegerD.Moreover,themostefficientknownalgorithmssuchasF 5 [15] reduce Gröbner basis computations to a series of Gaussian eliminations on matrices of increasing sizes. Definition2(MacaulayMatrix[23]).Letf 1,...,f m Z q [x 1,...,x n ].TheMacaulaymatrixM acaulay d,m (f 1,...,f m ) of degree d is defined as follows: list horizontally all the degree d monomials from smallest to largest sorted by some fixed admissible monomial ordering. The smallest monomial comes last. Multiplyeachf i byallmonomialst i,j ofdegreed d i whered i =deg(f i ). Finally,constructthe coefficient matrix for the resulting system: M acaulay d,m (f 1,...,f m ):= (t 1,1,f 1 ) (t 1,2,f 1 ). (t m,1,f m ) (t m,2,f m ).. monomialsofdegree dsortedfor < Theorem3([22]). Letf =(f 1,...,f m ) (Z q [x 1,...,x n ]) m and <beamonomialordering.there existsapositiveintegerdforwhichgaussianeliminationonallm acaulay d,m = (f 1,...,f m )matrices ford,1 d DcomputesaGröbnerbasisof f 1,...,f m w.r.t.to <.ThedegreeDwillbecalled degreeofregularityoff 1,...,f m. Consequently, the complexity of computing a Gröbner basis is bounded by the complexity of performing Gaussian elimination on the Macaulay matrix in some degree D. Roughly, the complexityofcomputingagröbnerbasiswithanalgorithmbasedonthedegreeofregularity(suchas but notlimitedtoo Buchberger salgorithm,f 4,F 5 [15,11,12,14])is: (( ) n+d ω ) O, (1) D where2 ω<3isthelinearalgebraconstant,anddisthedegreeofsemi-regularityofthesystem. Ingeneral,computingthedegreeofregularityofasystemisadifficultproblem.However,itis knownforaspecificfamilyofpolynomialsystems[6,8,7,9].
4 On the complexity of the Arora-Ge Algorithm against LWE 95 Definition4(Semi-regularSequence[8]). Letm >n,andf 1,...,f m Z q [x 1,...,x n ]behomogeneouspolynomialsofdegreesd 1,...,d m respectivelyanditheidealgeneratedbythesepolynomials.thesystemissaidtobeasemi-regularsequenceifthehilbertseries[13]ofiw.r.t.thegrevlex order is: [ m H I (z)= i=1 (1 z d ] i) (1 z) n, (2) + where [S] + denotestheseriesobtainedbytruncatingsbeforetheindexofitsfirstnon-positive coefficient. Thus, the degree of regularity D involved in Theorem 3 for a semi-regular sequence is: Improving Arora-Ge Approach 1+deg(H I ). We briefly detail below the linearization approach of Arora-Ge. We then discuss whether Gröbner basescanbeusedinthiscontext. Basic Arora-Ge Algorithm A Linerization Approach The idea of[5] is to generate a non-linear noise-free system of equations from LWE samples. This is due to the following well-known feature of a Gaussian noise: Lemma5.LetC>0beaconstant.Itholdsthat: Pr[e $ χ α,q : e >C σ] e O( C2). As a consequence, elements sampled from a Gaussian distribution only takes values on a(small) subset [ C σ,...,c σ]of Z q withhighprobability. Fromnowon,wesett=C σ. Wecanreinterpret Lemma 5 algebraically by considering the polynomial: P(X)=X t i=1 (X+i)(X i). ClearlyPisofdegree2t+1 O(σ). Thus,ife $ χ α,q,thenp(e) =0withprobabilityatleast 1 e O( C2). Fori 1,let (a i, a i,s +e i )=(a i,b i ) Z n $ q Z q.ife i χ α,q,then P ( a i, a i,s b i ) =0, (3) withprobabilityatleast1 e O( C2). Asaconsequence,eachsample (a i, a i,s +e i ) = (a i,b i ) Z n q Z q allowstogenerateanon-linearequationofdegree2t+1inthencomponentsofthesecret s. TheideaofArora&Geisthentogeneratesufficientlymanyequationsasin(3)toperforma linearization.however,onehastochoosetheconstant denotedbyc AG occurringinlemma5 sufficientlybigsothatallerrorsgeneratedlieswithhighprobabilityin[ C AG σ,...,c AG σ] Z q, i.e.thesecretsisindeedacommonsolutionofthem AG equationsconstructedasin(3).tothisend, we set: p f = M AG e O(C2 AG ). Thisistheprobablythatthesecrets Z n qisnotsolutionofthesystems AG generatedfromm AG equationsasin(3),i.e.theprobabilityoffailureofarora-geapproach.letalsod AG =2C AG σ+1 bethedegreeoftheequationsoccuringins AG.Accordingto[5],takingC AG Õ(σ)allowstomake the probability of failure negligible. Tosummarize,Arora-GeapproachreducestolinearizeatsystemofM AG equationsofdegree D AG =2C AG σ+1 Õ(σ 2 ).Moreover,correctnessofthisapproachcanbeproven:
5 96 WMC&SCC2012 Theorem6.[5]LetD AG <q.thesystemobtainedbylinearizingm AG =O ( q log(q) ( n+d AG D AG ) σ )= n O(D AG) =2Õ(D AG) equationsasin(3)hasatmostonesolutionwithhighprobability. The time complexity of the basic Arora-Ge approach is then C plx AG =no(d AG) =2Õ(σ2) =2Õ(n2ε). Notealsothisalgorithmalsorequires2Õ(n2ε) LWEsamplesforperformingthelinearization. From Linerization to Gröbner Bases ThequestionwetrytoaddresshereiswhetherthecomplexityC plx AG canbeimprovedbyusing Gröbnerbasesinsteadoflinearization.TherationalisthatyoucandecreasetheconstantC AG (and sothedegreeoftheequations)toavaluesmallerthanõ(n 2 ε )byconsideringlessequations(whilst keepingtheprobabilityp f offailuresimilarinbotherapproaches).however,thecostofthesolving stepincreasesinceonehastocomputeagröbnerbasis. Thequestionisthentofind ifany a tradeoff allowing to improve upon linearization. Todoso,wewillconsideranumberofequationsoftheform θ M AG,with θ >1(θ=1isthe basic Arora-Ge). We want to keep the probability of failure similar for the linearization and Gröbner basisapproaches.asaconsequence,weneedtotakeaconstantc θ suchthat: p f = θ MAG e O(C2 θ ). AneasycalculationleadstoC θ Õ ( C θ AG ).Thus,decreasingthenumberofequationsfromM AG to θ MAG allowstodividetheconstantc AG byafactor θ.thedegreeoftheequationswearedoing toconsideristhenequalto2σ C θ +1 Õ ( σ 2 θ ). Thequestionisnowtofindagoodcandidatefor θ.typically,if θistoobigthenyouwillgreatly decrease the number of equations, but the cost of the solving step will become prohibitive and the total complexity will be worth than for a linearization. Wehaveconsideredaθoftheform: θ=n 2 β,forsome β 0(notethatwegetthebasicArora- Gebytaking β =0). Inthisnewsetting,wegetaconstantC β =n ε β. Wehavethentosolvea systemhavingm β = n2 β MAG 2Õ(n2(ε β)) equationsofdegreed β =Õ(n 2 ε β ). Wedenotesuch systembys GB (β). ThequestionistodeterminethecomplexityC plx GB AG (β)ofsolvings AG(β).Thisreducestostudy itsdegreeofregularityd β reg.givencurrentalgorithms,thespecificstructureofthesystemdoesnot allowtosolveitfasterthanrandomsystems.asaconsequence,weassumethatd β regisnotbigger thanthedegreeofregularityofasemi-regularsystemofthesamesize 2,namely: where: D β reg 1+deg(H β), H β (z)= [ ] (1 z D β) M β (1 z) n, + where [.] + denotestheseriesobtainedbytruncatingbeforetheindexofitsfirstnon-positivecoefficient. We present below some experiments performed for β = 1/5. We have computed explicitly the complexities for both approaches: linearization and Gröbner bases. As suggested in[27], 2 Wehaveperformedfewexperimentsforsmallparameters.Theexperimentsseemtoconfirmthishypothesis.
6 On the complexity of the Arora-Ge Algorithm against LWE 97 weconsideredq n 2 and α =1/( ( ) n log 2 n)weplottedbelowthespeed-upweobtained,i.e. C plx GB AG log (β) 2 (y-axis)forn,0 n WecanseethatGröbnerbasesallowtoimprove C plx AG the complexity of the basic Arora-Ge when n 5000(x-axis). Note that further experiments are requiredtoconfirmthisbehaviorwhenntendstoinfinity 3 However,theformofthespeed-upalsotendstosuggestthatweonlyimprovefromaconstantC plx AG. change the asymptotical behavior of the Arora&Ge approach. we mention that we are currently consideringseveralformsforthe β.inparticular, βwhichisnotaconstantbutafunctionofn.asa conclusion, we also emphasize that Arora-Ge needs exponential(or subexponetial) number of LWE samples. For most cryptosystems based on LWE, you have access to much less samples, typically polynomially-many. In this situation, you have then not enough samples to perform the linearization andtheonlyoptiontomountthearora&geapproachistosolvethesystembyusinggröbnerbases. References [1] A. Akavia, S. Goldwasser, and V. Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In O. Reingold, editor, TCC, volume 5444 of Lecture Notes in Computer Science, pages Springer Verlag, [2]M.R.AlbrechtandC.Cid.Coldbootkeyrecoverybysolvingpolynomialsystemswithnoise. In J. Lopez and G. Tsudik, editors, ACNS, volume 6715 of Lecture Notes in Computer Science, pages 57 72, [3] M. R. Albrecht and K. G. Paterson. Breaking an identity-based encryption scheme based on dhies. In L. Chen, editor, IMA Int. Conf., volume 7089 of Lecture Notes in Computer Science, pages Springer Verlag, [4] M. R. Albrecht, P. Farshim, J.-C. Faugère, and L. Perret. Polly Cracker, revisited. In Advances in Cryptology ASIACRYPT 2011, volume 7073 of Lecture Notes in Computer Science, pages , Berlin, Heidelberg, New York, Springer Verlag. full version available as Cryptology eprint Archive, Report 2011/289, Notethatthedegreeoftheequationsinvolvedbeinghuge,itbecomesrathercostlytojustexpandtheHilbertseriesfor the systems considered.
7 98 WMC&SCC2012 [5]S.AroraandR.Ge.Newalgorithmsforlearninginpresenceoferrors.InL.Aceto,M.Henzinger, and J. Sgall, editors, ICALP, volume 6755 of Lecture Notes in Computer Science, pages Springer Verlag, [6] M. Bardet. Étude des systèmes algébriques surdéterminés. Applications aux codes correcteurs et à la cryptographie. PhD thesis, Université de Paris VI, [7] M. Bardet, J.-C. Faugère, and B. Salvy. Complexity study of Gröbner basis computation. Technical report, INRIA, [8] M. Bardet, J.-C. Faugère, and B. Salvy. On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In Proc. International Conference on Polynomial System Solving(ICPSS), pages 71 75, [9] M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang. Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry, [10] Z. Brakerski and V. Vaikuntanathan. Efficient fully homomorphic encryption from(standard) LWE. In R. Ostrovsky, editor, IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, pages IEEE, [11] B. Buchberger. Ein Algorithmus zum Auffinden der Basiselemente des Restklassenringes nach einem nulldimensionalen Polynomideal. PhD thesis, University of Innsbruck, [12]B.Buchberger,G.E.Collins,R.G.K.Loos,andR.Albrecht.Computeralgebrasymbolicand algebraic computation. SIGSAM Bull., 16(4):5 5, [13] D. A. Cox, J. B. Little, and D. O Shea. Ideals, Varieties and Algorithms. Springer Verlag, [14] J.-C. Faugère. A new efficient algorithm for computing Gröbner bases(f4). Journal of Pure and Applied Algebra, 139:61 88, June [15] J.-C. Faugère. A new efficient algorithm for computing Gröbner bases without reduction to zero(f5). In T. Mora, editor, Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation ISSAC, pages ACM Press, July isbn: [16] J.-C. Faugère and A. Joux. Algebraic cryptanalysis of hidden field equation(hfe) cryptosystems using gröbner bases. In D. Boneh, editor, CRYPTO, volume 2729 of Lecture Notes in Computer Science, pages Springer Verlag, [17] J.-C. Faugère and L. Perret. Polynomial equivalence problems: Algorithmic and theoretical aspects. In S. Vaudenay, editor, Advances in Cryptology EUROCRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages Springer Verlag, [18] J.-C. Faugère, F. L. dit Vehel, and L. Perret. Cryptanalysis of minrank. In Wagner[28], pages [19] J.-C. Faugère, A. Otmani, L. Perret, and J.-P. Tillich. In Advances in Cryptology EURO- CRYPT 2010, volume 6110 of Lecture Notes in Computer Science, pages Springer Verlag, [20] J.-C. Faugère, L. Perret, C. Petit, and G. Renault. Improving the complexity of index calculus algorithms in elliptic curves over binary fields. In D. Pointcheval and T. Johansson, editors, Advances in Cryptology- EUROCRYPT 2012, volume 7237 of Lecture Notes in Computer Science, pages Springer Verlag, 2012.
8 On the complexity of the Arora-Ge Algorithm against LWE 99 [21] C. Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University, Available at [22] D. Lazard. Gröbner-bases, Gaussian elimination and resolution of systems of algebraic equations. In Proceedings of the European Computer Algebra Conference on Computer Algebra, volume 162 of Lecture Notes in Computer Science, Berlin, Heidelberg, New York, Springer Verlag. [23] F. S. Macaulay. On some formula in elimination. London Mathematical Society, 1(33):3 27, [24] C. Peikert. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In M. Mitzenmacher, editor, Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, pages ACM, [25] C. Peikert, V. Vaikuntanathan, and B. Waters. A framework for efficient and composable oblivious transfer. In Wagner[28], pages [26] O. Regev. On lattices, learning with errors, random linear codes, and cryptography. In H. N. Gabow and R. Fagin, editors, STOC, pages ACM, [27] O. Regev. On lattices, learning with errors, random linear codes, and cryptography. J. ACM, 56(6), [28] D. Wagner, editor. Advances in Cryptology- CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, Proceedings, volume 5157 of Lecture Notes in Computer Science, Springer Verlag. M. R. Albrecht INRIA, LIP6, CNRS malb@lip6.fr C. Cid Royal Holloway, University of London carlos.cid@rhul.ac.uk J.-C. Faugère INRIA, LIP6, CNRS jean-charles.faugere@inria.fr R. Fitzpatrick Royal Holloway, University of London robert.fitzpatrick.2010@live.rhul.ac.uk L. Perret INRIA, LIP6, CNRS ludovic.perret@lip6.fr
Solving LWE with BKW
Martin R. Albrecht 1 Jean-Charles Faugére 2,3 1,4 Ludovic Perret 2,3 ISG, Royal Holloway, University of London INRIA CNRS IIS, Academia Sinica, Taipei, Taiwan PKC 2014, Buenos Aires, Argentina, 28th March
More informationAlgebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis
Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Jean-Charles Faugère 1, Ayoub Otmani 2,3, Ludovic Perret 1, and Jean-Pierre Tillich 2 1 SALSA Project - INRIA (Centre
More informationOn Newton-Raphson iteration for multiplicative inverses modulo prime powers
On Newton-Raphson iteration for multiplicative inverses modulo prime powers Jean-Guillaume Dumas To cite this version: Jean-Guillaume Dumas. On Newton-Raphson iteration for multiplicative inverses modulo
More informationGröbner Bases Techniques in Post-Quantum Cryptography
Gröbner Bases Techniques in Post-Quantum Cryptography Ludovic Perret Sorbonne Universités, UPMC Univ Paris 06, INRIA Paris LIP6, PolSyS Project, Paris, France Post-Quantum Cryptography Winter School, Fukuoka,
More informationCS Topics in Cryptography January 28, Lecture 5
CS 4501-6501 Topics in Cryptography January 28, 2015 Lecture 5 Lecturer: Mohammad Mahmoody Scribe: Ameer Mohammed 1 Learning with Errors: Motivation An important goal in cryptography is to find problems
More informationFactorisation of RSA-704 with CADO-NFS
Factorisation of RSA-704 with CADO-NFS Shi Bai, Emmanuel Thomé, Paul Zimmermann To cite this version: Shi Bai, Emmanuel Thomé, Paul Zimmermann. Factorisation of RSA-704 with CADO-NFS. 2012. HAL Id: hal-00760322
More informationOn the relation of the Mutant strategy and the Normal Selection strategy
On the relation of the Mutant strategy and the Normal Selection strategy Martin Albrecht 1 Carlos Cid 2 Jean-Charles Faugère 1 Ludovic Perret 1 1 SALSA Project -INRIA, UPMC, Univ Paris 06 2 Information
More informationAlgebraic Cryptanalysis of Curry and Flurry using Correlated Messages
Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages Jean-Charles Faugère and Ludovic Perret SALSA Project INRIA, Centre Paris-Rocquencourt UPMC, Univ Paris 06, LIP6 CNRS, UMR 7606, LIP6
More informationAnalysis of Boyer and Moore s MJRTY algorithm
Analysis of Boyer and Moore s MJRTY algorithm Laurent Alonso, Edward M. Reingold To cite this version: Laurent Alonso, Edward M. Reingold. Analysis of Boyer and Moore s MJRTY algorithm. Information Processing
More informationPolly Cracker, revisited, revisited
Polly Cracker, revisited, revisited Gottfried Herold Ruhr-Universität Bochum Horst Görtz Insitute for IT-Security Bochum, Germany gottfried.herold@rub.de Abstract. In this paper, we consider the Polly
More informationMethylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma.
Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma. Loïc De Pontual, Delphine Trochet, Franck Bourdeaut, Sophie Thomas, Heather Etchevers, Agnes Chompret, Véronique Minard,
More informationA Simple Proof of P versus NP
A Simple Proof of P versus NP Frank Vega To cite this version: Frank Vega. A Simple Proof of P versus NP. 2016. HAL Id: hal-01281254 https://hal.archives-ouvertes.fr/hal-01281254 Submitted
More informationOn size, radius and minimum degree
On size, radius and minimum degree Simon Mukwembi To cite this version: Simon Mukwembi. On size, radius and minimum degree. Discrete Mathematics and Theoretical Computer Science, DMTCS, 2014, Vol. 16 no.
More informationA new simple recursive algorithm for finding prime numbers using Rosser s theorem
A new simple recursive algorithm for finding prime numbers using Rosser s theorem Rédoane Daoudi To cite this version: Rédoane Daoudi. A new simple recursive algorithm for finding prime numbers using Rosser
More informationEaster bracelets for years
Easter bracelets for 5700000 years Denis Roegel To cite this version: Denis Roegel. Easter bracelets for 5700000 years. [Research Report] 2014. HAL Id: hal-01009457 https://hal.inria.fr/hal-01009457
More informationOn Symmetric Norm Inequalities And Hermitian Block-Matrices
On Symmetric Norm Inequalities And Hermitian lock-matrices Antoine Mhanna To cite this version: Antoine Mhanna On Symmetric Norm Inequalities And Hermitian lock-matrices 015 HAL Id: hal-0131860
More informationA non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications
A non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications Alexandre Sedoglavic To cite this version: Alexandre Sedoglavic. A non-commutative algorithm for multiplying (7 7) matrices
More informationThe Accelerated Euclidean Algorithm
The Accelerated Euclidean Algorithm Sidi Mohamed Sedjelmaci To cite this version: Sidi Mohamed Sedjelmaci The Accelerated Euclidean Algorithm Laureano Gonzales-Vega and Thomas Recio Eds 2004, University
More informationComputing Minimal Polynomial of Matrices over Algebraic Extension Fields
Bull. Math. Soc. Sci. Math. Roumanie Tome 56(104) No. 2, 2013, 217 228 Computing Minimal Polynomial of Matrices over Algebraic Extension Fields by Amir Hashemi and Benyamin M.-Alizadeh Abstract In this
More informationPractical Analysis of Key Recovery Attack against Search-LWE Problem
Practical Analysis of Key Recovery Attack against Search-LWE Problem The 11 th International Workshop on Security, Sep. 13 th 2016 Momonari Kudo, Junpei Yamaguchi, Yang Guo and Masaya Yasuda 1 Graduate
More informationLower bound of the covering radius of binary irreducible Goppa codes
Lower bound of the covering radius of binary irreducible Goppa codes Sergey Bezzateev, Natalia Shekhunova To cite this version: Sergey Bezzateev, Natalia Shekhunova. Lower bound of the covering radius
More informationLazy Modulus Switching for the BKW Algorithm on LWE
Lazy Modulus Switching for the BKW Algorithm on LWE Martin R. Albrecht 1, Jean-Charles Faugre 3,,4, Robert Fitzpatrick 5, and Ludovic Perret,3,4 1 Technical University of Denmark, Denmark Sorbonne Universits,
More informationSmart Bolometer: Toward Monolithic Bolometer with Smart Functions
Smart Bolometer: Toward Monolithic Bolometer with Smart Functions Matthieu Denoual, Gilles Allègre, Patrick Attia, Olivier De Sagazan To cite this version: Matthieu Denoual, Gilles Allègre, Patrick Attia,
More informationCompleteness of the Tree System for Propositional Classical Logic
Completeness of the Tree System for Propositional Classical Logic Shahid Rahman To cite this version: Shahid Rahman. Completeness of the Tree System for Propositional Classical Logic. Licence. France.
More informationLattice Reduction Attacks on HE Schemes. Martin R. Albrecht 15/03/2018
Lattice Reduction Attacks on HE Schemes Martin R. Albrecht 15/03/2018 Learning with Errors The Learning with Errors (LWE) problem was defined by Oded Regev. 1 Given (A, c) with uniform A Z m n q, uniform
More informationDispersion relation results for VCS at JLab
Dispersion relation results for VCS at JLab G. Laveissiere To cite this version: G. Laveissiere. Dispersion relation results for VCS at JLab. Compton Scattering from Low to High Momentum Transfer, Mar
More informationClassical hardness of Learning with Errors
Classical hardness of Learning with Errors Adeline Langlois Aric Team, LIP, ENS Lyon Joint work with Z. Brakerski, C. Peikert, O. Regev and D. Stehlé Adeline Langlois Classical Hardness of LWE 1/ 13 Our
More informationb-chromatic number of cacti
b-chromatic number of cacti Victor Campos, Claudia Linhares Sales, Frédéric Maffray, Ana Silva To cite this version: Victor Campos, Claudia Linhares Sales, Frédéric Maffray, Ana Silva. b-chromatic number
More informationFull-order observers for linear systems with unknown inputs
Full-order observers for linear systems with unknown inputs Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu To cite this version: Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu. Full-order observers
More informationGröbner Bases in Public-Key Cryptography
Gröbner Bases in Public-Key Cryptography Ludovic Perret SPIRAL/SALSA LIP6, Université Paris 6 INRIA ludovic.perret@lip6.fr ECRYPT PhD SUMMER SCHOOL Emerging Topics in Cryptographic Design and Cryptanalysis
More informationOn Poincare-Wirtinger inequalities in spaces of functions of bounded variation
On Poincare-Wirtinger inequalities in spaces of functions of bounded variation Maïtine Bergounioux To cite this version: Maïtine Bergounioux. On Poincare-Wirtinger inequalities in spaces of functions of
More informationClassical hardness of the Learning with Errors problem
Classical hardness of the Learning with Errors problem Adeline Langlois Aric Team, LIP, ENS Lyon Joint work with Z. Brakerski, C. Peikert, O. Regev and D. Stehlé August 12, 2013 Adeline Langlois Hardness
More informationNegative results on acyclic improper colorings
Negative results on acyclic improper colorings Pascal Ochem To cite this version: Pascal Ochem. Negative results on acyclic improper colorings. Stefan Felsner. 005 European Conference on Combinatorics,
More informationAnalyzing large-scale spike trains data with spatio-temporal constraints
Analyzing large-scale spike trains data with spatio-temporal constraints Hassan Nasser, Olivier Marre, Selim Kraria, Thierry Viéville, Bruno Cessac To cite this version: Hassan Nasser, Olivier Marre, Selim
More informationCase report on the article Water nanoelectrolysis: A simple model, Journal of Applied Physics (2017) 122,
Case report on the article Water nanoelectrolysis: A simple model, Journal of Applied Physics (2017) 122, 244902 Juan Olives, Zoubida Hammadi, Roger Morin, Laurent Lapena To cite this version: Juan Olives,
More informationWidely Linear Estimation with Complex Data
Widely Linear Estimation with Complex Data Bernard Picinbono, Pascal Chevalier To cite this version: Bernard Picinbono, Pascal Chevalier. Widely Linear Estimation with Complex Data. IEEE Transactions on
More informationThe Windy Postman Problem on Series-Parallel Graphs
The Windy Postman Problem on Series-Parallel Graphs Francisco Javier Zaragoza Martínez To cite this version: Francisco Javier Zaragoza Martínez. The Windy Postman Problem on Series-Parallel Graphs. Stefan
More informationOn one class of permutation polynomials over finite fields of characteristic two *
On one class of permutation polynomials over finite fields of characteristic two * Leonid Bassalygo, Victor A. Zinoviev To cite this version: Leonid Bassalygo, Victor A. Zinoviev. On one class of permutation
More informationClassical hardness of Learning with Errors
Classical hardness of Learning with Errors Zvika Brakerski 1 Adeline Langlois 2 Chris Peikert 3 Oded Regev 4 Damien Stehlé 2 1 Stanford University 2 ENS de Lyon 3 Georgia Tech 4 New York University Our
More informationSensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length
Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length Tudor Petrescu, Jacques Oksman To cite this version: Tudor Petrescu, Jacques Oksman. Sensitivity of
More informationEvolution of the cooperation and consequences of a decrease in plant diversity on the root symbiont diversity
Evolution of the cooperation and consequences of a decrease in plant diversity on the root symbiont diversity Marie Duhamel To cite this version: Marie Duhamel. Evolution of the cooperation and consequences
More informationOn path partitions of the divisor graph
On path partitions of the divisor graph Paul Melotti, Eric Saias To cite this version: Paul Melotti, Eric Saias On path partitions of the divisor graph 018 HAL Id: hal-0184801 https://halarchives-ouvertesfr/hal-0184801
More informationOn infinite permutations
On infinite permutations Dmitri G. Fon-Der-Flaass, Anna E. Frid To cite this version: Dmitri G. Fon-Der-Flaass, Anna E. Frid. On infinite permutations. Stefan Felsner. 2005 European Conference on Combinatorics,
More informationAlgebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis
Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Jean-Charles Faugère 1, Ayoub Otmani 2,3, Ludovic Perret 1, and Jean-Pierre Tillich 2 1 SALSA Project - INRIA (Centre
More informationThomas Lugand. To cite this version: HAL Id: tel
Contribution à la Modélisation et à l Optimisation de la Machine Asynchrone Double Alimentation pour des Applications Hydrauliques de Pompage Turbinage Thomas Lugand To cite this version: Thomas Lugand.
More informationThe Mahler measure of trinomials of height 1
The Mahler measure of trinomials of height 1 Valérie Flammang To cite this version: Valérie Flammang. The Mahler measure of trinomials of height 1. Journal of the Australian Mathematical Society 14 9 pp.1-4.
More informationOn the Griesmer bound for nonlinear codes
On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas
More informationOn Symmetric Norm Inequalities And Hermitian Block-Matrices
On Symmetric Norm Inequalities And Hermitian lock-matrices Antoine Mhanna To cite this version: Antoine Mhanna On Symmetric Norm Inequalities And Hermitian lock-matrices 016 HAL Id: hal-0131860
More informationSparse multivariate factorization by mean of a few bivariate factorizations
Sparse multivariate factorization by mean of a few bivariate factorizations Bernard Parisse To cite this version: Bernard Parisse. Sparse multivariate factorization by mean of a few bivariate factorizations.
More informationapproximation results for the Traveling Salesman and related Problems
approximation results for the Traveling Salesman and related Problems Jérôme Monnot To cite this version: Jérôme Monnot. approximation results for the Traveling Salesman and related Problems. Information
More informationLazy Modulus Switching for the BKW Algorithm on LWE
Lazy Modulus Switching for the BKW Algorithm on LWE Martin R. Albrecht 1, Jean-Charles Faugère 3,2,4, Robert Fitzpatrick 5, and Ludovic Perret 2,3,4 1 Technical University of Denmark, Denmark 2 Sorbonne
More informationTrench IGBT failure mechanisms evolution with temperature and gate resistance under various short-circuit conditions
Trench IGBT failure mechanisms evolution with temperature and gate resistance under various short-circuit conditions Adel Benmansour, Stephane Azzopardi, Jean-Christophe Martin, Eric Woirgard To cite this
More informationSecure Delegation of Elliptic-Curve Pairing
Secure Delegation of Elliptic-Curve Pairing Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel Mccullagh, David Naccache, Michael Scott To cite this version: Benoît Chevallier-Mames, Jean-Sébastien Coron,
More informationDifferential approximation results for the Steiner tree problem
Differential approximation results for the Steiner tree problem Marc Demange, Jérôme Monnot, Vangelis Paschos To cite this version: Marc Demange, Jérôme Monnot, Vangelis Paschos. Differential approximation
More informationAntipodal radiation pattern of a patch antenna combined with superstrate using transformation electromagnetics
Antipodal radiation pattern of a patch antenna combined with superstrate using transformation electromagnetics Mark Clemente Arenas, Anne-Claire Lepage, Xavier Begaud To cite this version: Mark Clemente
More informationExact Comparison of Quadratic Irrationals
Exact Comparison of Quadratic Irrationals Phuc Ngo To cite this version: Phuc Ngo. Exact Comparison of Quadratic Irrationals. [Research Report] LIGM. 20. HAL Id: hal-0069762 https://hal.archives-ouvertes.fr/hal-0069762
More informationDissipative Systems Analysis and Control, Theory and Applications: Addendum/Erratum
Dissipative Systems Analysis and Control, Theory and Applications: Addendum/Erratum Bernard Brogliato To cite this version: Bernard Brogliato. Dissipative Systems Analysis and Control, Theory and Applications:
More informationPasserelle entre les arts : la sculpture sonore
Passerelle entre les arts : la sculpture sonore Anaïs Rolez To cite this version: Anaïs Rolez. Passerelle entre les arts : la sculpture sonore. Article destiné à l origine à la Revue de l Institut National
More informationNew estimates for the div-curl-grad operators and elliptic problems with L1-data in the half-space
New estimates for the div-curl-grad operators and elliptic problems with L1-data in the half-space Chérif Amrouche, Huy Hoang Nguyen To cite this version: Chérif Amrouche, Huy Hoang Nguyen. New estimates
More informationThe FLRW cosmological model revisited: relation of the local time with th e local curvature and consequences on the Heisenberg uncertainty principle
The FLRW cosmological model revisited: relation of the local time with th e local curvature and consequences on the Heisenberg uncertainty principle Nathalie Olivi-Tran, Paul M Gauthier To cite this version:
More informationSoundness of the System of Semantic Trees for Classical Logic based on Fitting and Smullyan
Soundness of the System of Semantic Trees for Classical Logic based on Fitting and Smullyan Shahid Rahman To cite this version: Shahid Rahman. Soundness of the System of Semantic Trees for Classical Logic
More informationVibro-acoustic simulation of a car window
Vibro-acoustic simulation of a car window Christophe Barras To cite this version: Christophe Barras. Vibro-acoustic simulation of a car window. Société Française d Acoustique. Acoustics 12, Apr 12, Nantes,
More informationLearning an Adaptive Dictionary Structure for Efficient Image Sparse Coding
Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding Jérémy Aghaei Mazaheri, Christine Guillemot, Claude Labit To cite this version: Jérémy Aghaei Mazaheri, Christine Guillemot,
More informationA non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications
A non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications Alexandre Sedoglavic To cite this version: Alexandre Sedoglavic. A non-commutative algorithm for multiplying (7 7) matrices
More informationFast Computation of Moore-Penrose Inverse Matrices
Fast Computation of Moore-Penrose Inverse Matrices Pierre Courrieu To cite this version: Pierre Courrieu. Fast Computation of Moore-Penrose Inverse Matrices. Neural Information Processing - Letters and
More informationUnfolding the Skorohod reflection of a semimartingale
Unfolding the Skorohod reflection of a semimartingale Vilmos Prokaj To cite this version: Vilmos Prokaj. Unfolding the Skorohod reflection of a semimartingale. Statistics and Probability Letters, Elsevier,
More informationComparison between XL and Gröbner Basis Algorithms
Comparison between XL and Gröbner Basis Algorithms Gwénolé Ars 1, Jean-Charles Faugère 2, Hideki Imai 3, Mitsuru Kawazoe 4, and Makoto Sugita 5 1 IRMAR, University of Rennes 1 Campus de Beaulieu 35042
More informationAnalysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields
Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 278-283 Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields N. G. Kuzmina and E. B. Makhovenko Saint-Petersburg
More informationA proximal approach to the inversion of ill-conditioned matrices
A proximal approach to the inversion of ill-conditioned matrices Pierre Maréchal, Aude Rondepierre To cite this version: Pierre Maréchal, Aude Rondepierre. A proximal approach to the inversion of ill-conditioned
More informationCutwidth and degeneracy of graphs
Cutwidth and degeneracy of graphs Benoit Kloeckner To cite this version: Benoit Kloeckner. Cutwidth and degeneracy of graphs. IF_PREPUB. 2009. HAL Id: hal-00408210 https://hal.archives-ouvertes.fr/hal-00408210v1
More informationImpedance Transmission Conditions for the Electric Potential across a Highly Conductive Casing
Impedance Transmission Conditions for the Electric Potential across a Highly Conductive Casing Hélène Barucq, Aralar Erdozain, David Pardo, Victor Péron To cite this version: Hélène Barucq, Aralar Erdozain,
More informationAxiom of infinity and construction of N
Axiom of infinity and construction of N F Portal To cite this version: F Portal. Axiom of infinity and construction of N. 2015. HAL Id: hal-01162075 https://hal.archives-ouvertes.fr/hal-01162075 Submitted
More informationStickelberger s congruences for absolute norms of relative discriminants
Stickelberger s congruences for absolute norms of relative discriminants Georges Gras To cite this version: Georges Gras. Stickelberger s congruences for absolute norms of relative discriminants. Journal
More informationFrom Unstructured 3D Point Clouds to Structured Knowledge - A Semantics Approach
From Unstructured 3D Point Clouds to Structured Knowledge - A Semantics Approach Christophe Cruz, Helmi Ben Hmida, Frank Boochs, Christophe Nicolle To cite this version: Christophe Cruz, Helmi Ben Hmida,
More informationInfluence of a Rough Thin Layer on the Potential
Influence of a Rough Thin Layer on the Potential Ionel Ciuperca, Ronan Perrussel, Clair Poignard To cite this version: Ionel Ciuperca, Ronan Perrussel, Clair Poignard. Influence of a Rough Thin Layer on
More informationCan we reduce health inequalities? An analysis of the English strategy ( )
Can we reduce health inequalities? An analysis of the English strategy (1997-2010) Johan P Mackenbach To cite this version: Johan P Mackenbach. Can we reduce health inequalities? An analysis of the English
More informationAlgebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt,
More informationL institution sportive : rêve et illusion
L institution sportive : rêve et illusion Hafsi Bedhioufi, Sida Ayachi, Imen Ben Amar To cite this version: Hafsi Bedhioufi, Sida Ayachi, Imen Ben Amar. L institution sportive : rêve et illusion. Revue
More informationEntropies and fractal dimensions
Entropies and fractal dimensions Amelia Carolina Sparavigna To cite this version: Amelia Carolina Sparavigna. Entropies and fractal dimensions. Philica, Philica, 2016. HAL Id: hal-01377975
More informationHybrid Approach : a Tool for Multivariate Cryptography
Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6
More informationComparison of Harmonic, Geometric and Arithmetic means for change detection in SAR time series
Comparison of Harmonic, Geometric and Arithmetic means for change detection in SAR time series Guillaume Quin, Béatrice Pinel-Puysségur, Jean-Marie Nicolas To cite this version: Guillaume Quin, Béatrice
More informationA new approach of the concept of prime number
A new approach of the concept of prime number Jamel Ghannouchi To cite this version: Jamel Ghannouchi. A new approach of the concept of prime number. 4 pages. 24. HAL Id: hal-3943 https://hal.archives-ouvertes.fr/hal-3943
More informationExogenous input estimation in Electronic Power Steering (EPS) systems
Exogenous input estimation in Electronic Power Steering (EPS) systems Valentina Ciarla, Carlos Canudas de Wit, Franck Quaine, Violaine Cahouet To cite this version: Valentina Ciarla, Carlos Canudas de
More informationConfluence Algebras and Acyclicity of the Koszul Complex
Confluence Algebras and Acyclicity of the Koszul Complex Cyrille Chenavier To cite this version: Cyrille Chenavier. Confluence Algebras and Acyclicity of the Koszul Complex. Algebras and Representation
More informationHardware Operator for Simultaneous Sine and Cosine Evaluation
Hardware Operator for Simultaneous Sine and Cosine Evaluation Arnaud Tisserand To cite this version: Arnaud Tisserand. Hardware Operator for Simultaneous Sine and Cosine Evaluation. ICASSP 6: International
More informationOn The Exact Solution of Newell-Whitehead-Segel Equation Using the Homotopy Perturbation Method
On The Exact Solution of Newell-Whitehead-Segel Equation Using the Homotopy Perturbation Method S. Salman Nourazar, Mohsen Soori, Akbar Nazari-Golshan To cite this version: S. Salman Nourazar, Mohsen Soori,
More informationNumerical modification of atmospheric models to include the feedback of oceanic currents on air-sea fluxes in ocean-atmosphere coupled models
Numerical modification of atmospheric models to include the feedback of oceanic currents on air-sea fluxes in ocean-atmosphere coupled models Florian Lemarié To cite this version: Florian Lemarié. Numerical
More informationUnbiased minimum variance estimation for systems with unknown exogenous inputs
Unbiased minimum variance estimation for systems with unknown exogenous inputs Mohamed Darouach, Michel Zasadzinski To cite this version: Mohamed Darouach, Michel Zasadzinski. Unbiased minimum variance
More informationA novel method for estimating the flicker level generated by a wave energy farm composed of devices operated in variable speed mode
A novel method for estimating the flicker level generated by a wave energy farm composed of devices operated in variable speed mode Anne Blavette, Dara O Sullivan, Ray Alcorn, Mohamed Machmoum, Michael
More informationReduced Models (and control) of in-situ decontamination of large water resources
Reduced Models (and control) of in-situ decontamination of large water resources Antoine Rousseau, Alain Rapaport To cite this version: Antoine Rousseau, Alain Rapaport. Reduced Models (and control) of
More informationParameter selection in Ring-LWE-based cryptography
Parameter selection in Ring-LWE-based cryptography Rachel Player Information Security Group, Royal Holloway, University of London based on joint works with Martin R. Albrecht, Hao Chen, Kim Laine, and
More informationOn the longest path in a recursively partitionable graph
On the longest path in a recursively partitionable graph Julien Bensmail To cite this version: Julien Bensmail. On the longest path in a recursively partitionable graph. 2012. HAL Id:
More informationComment on: Sadi Carnot on Carnot s theorem.
Comment on: Sadi Carnot on Carnot s theorem. Jacques Arnaud, Laurent Chusseau, Fabrice Philippe To cite this version: Jacques Arnaud, Laurent Chusseau, Fabrice Philippe. Comment on: Sadi Carnot on Carnot
More informationInfluence of network metrics in urban simulation: introducing accessibility in graph-cellular automata.
Influence of network metrics in urban simulation: introducing accessibility in graph-cellular automata. Dominique Badariotti, Arnaud Banos, Diego Moreno To cite this version: Dominique Badariotti, Arnaud
More informationPosterior Covariance vs. Analysis Error Covariance in Data Assimilation
Posterior Covariance vs. Analysis Error Covariance in Data Assimilation François-Xavier Le Dimet, Victor Shutyaev, Igor Gejadze To cite this version: François-Xavier Le Dimet, Victor Shutyaev, Igor Gejadze.
More informationTerritorial Intelligence and Innovation for the Socio-Ecological Transition
Territorial Intelligence and Innovation for the Socio-Ecological Transition Jean-Jacques Girardot, Evelyne Brunau To cite this version: Jean-Jacques Girardot, Evelyne Brunau. Territorial Intelligence and
More informationParallel Repetition of entangled games on the uniform distribution
Parallel Repetition of entangled games on the uniform distribution André Chailloux, Scarpa Giannicola To cite this version: André Chailloux, Scarpa Giannicola. Parallel Repetition of entangled games on
More informationSOLAR RADIATION ESTIMATION AND PREDICTION USING MEASURED AND PREDICTED AEROSOL OPTICAL DEPTH
SOLAR RADIATION ESTIMATION AND PREDICTION USING MEASURED AND PREDICTED AEROSOL OPTICAL DEPTH Carlos M. Fernández-Peruchena, Martín Gastón, Maria V Guisado, Ana Bernardos, Íñigo Pagola, Lourdes Ramírez
More informationTwo-step centered spatio-temporal auto-logistic regression model
Two-step centered spatio-temporal auto-logistic regression model Anne Gégout-Petit, Shuxian Li To cite this version: Anne Gégout-Petit, Shuxian Li. Two-step centered spatio-temporal auto-logistic regression
More informationQuestion order experimental constraints on quantum-like models of judgement
Question order experimental constraints on quantum-like models of judgement Patrick Cassam-Chenaï To cite this version: Patrick Cassam-Chenaï. Question order experimental constraints on quantum-like models
More information