On the complexity of the Arora-Ge Algorithm against LWE

Size: px
Start display at page:

Download "On the complexity of the Arora-Ge Algorithm against LWE"

Transcription

1 On the complexity of the Arora-Ge Algorithm against LWE Martin Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret To cite this version: Martin Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret. On the complexity of the Arora-Ge Algorithm against LWE. SCC 2012 Third international conference on Symbolic Computation and Cryptography, Jul 2012, Castro Urdiales, Spain. pp.93-99, 2012, < <hal > HAL Id: hal Submitted on 15 Jan 2013 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

2 On the complexity of the Arora-Ge Algorithm against LWE Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, and Ludovic Perret Abstract Arora&Ge[5]recentlyshowedthatsolvingLWEcanbereducedtosolveahigh-degree non-linear system of equations. They used a linearization to solve the systems. We investigate here the possibility of using Gröbner bases to improve Arora& Ge approach. Introduction TheLearningWithErrors(LWE)ProblemwasintroducedbyRegevin[27,26]. Itisageneralisation for large primes of the well-known LPN(Learning Parity with Noise) problem. Since its introduction, LWE has become a source of many innovative cryptosystems, such as the oblivious transferprotocolbypeikertetal.[25],acryptosystembyakaviaetal.[1]thatissecureevenif almosttheentiresecretkeyisleaked,homomorphicencryption[21,10,4],etc...reasonsoflwe s success in cryptography include its simplicity as well as convincing theoretical arguments regarding its hardness, i.e. a reduction from(worst-case) assumed hard lattice problems to(average-case) LWE. The purpose of this paper is to investigate whether algebraic techniques(e.g.[16, 17, 18, 19, 3, 2,20])canbeusedinthecontextofLWE.ThisismotivatedbyarecentresultArora&Ge[5]who showed that solving LWE can be reduced to solve a high-degree non-linear system of equations. Learning With Errors WereproducebelowthedefinitionoftheLWEproblemfrom[27,26]. Definition1(LWE). Letn 1bethenumberofvariables,qbeanoddprimeinteger, χbea probabilitydistributionon Z q andsbeasecretvectorin Z n q. WedenotebyL s,χthe (n) probability distributionon Z n q Z qobtainedbychoosinga Z n q atrandom,choosinge Z qaccordingto χ, andreturning (a,c) = (a, a,s +e) Z n q Z q.lweistheproblemoffindings Z n qgivenpairs Z n q Z q sampledaccordingtol (n) s,χ. Themodulusqistypicallytakentobepolynomialinn,and χisthediscretegaussiandistributionon Z q withmean0andstandarddeviation σ = α q,forsome α. TodiscretizetheGaussian distribution N0,σ 2 moduloq,wesampleaccordingto N0,σ 2 androundtothenearestintegermod q.inwhatfollows, χ α,q willthendenotethisdiscretizeddistribution. Atypicalsettingforthestandarddeviation(std)is σ=n ε,with ε,0 ε 1.Forexample,[27] suggestsq n 2 and α=1/( n log 2 n).indeed,assoonas ε 1/2(worst-case)GAPSVP Õ(n/α) reducesto(average-case)lwe 1.Thus,anyalgorithmsolvingLWE(when ε 1/2)canbeusedfor GAPSVP Õ(n/α). We emphasize that it is widely believed that only exponential algorithm exists forsolvinggapsvp Õ(n/α). Recently, Arora& Ge[5] introduced a variant of LWE with structured errors. In this setting, you have given an oracle such that given LWE samples returns polynomials which vanish on the errors. 1 Thereductionisquantumifqispolynomialbutcanbemade[24]classicalifqissuperpolynomial. 93

3 94 WMC&SCC2012 They showed that the(discretized) Gaussian intrinsically induced a structure on the errors. This featurecanbeusedtoreducelwetotheproblemofsolvinganon-linearsystemofmultivariateof equations. Thetotalcomplexity(timeandspace)oftheirapproachis2Õ(n2ε). Itisthensubexponential when ε<1/2,butremainsexponentialwhen ε 1/2.ItisinterestingthatArora&Gereachwitha completely different approach the ε = 1/2 hardness limit advised by Regev[27, 26]. Note that an improvement on Arora&Ge could allow to challenge the subexponetiality of GAPSVP Õ(n/α). Remarkthat[5]useslinearizationtosolvethenon-linearsystem. Itisthen natural to investigate whether more advanced tools, such as Gröbner bases[11, 12, 13], could improve the algorithm of Arora&Ge. Inthisnote,wewillshowthatGröbnerbasescanbringapracticalimprovementonthecomplexityof[5].WealsobrieflydiscusswhetherGröbnerbasescan(orcannot)allowtochangethe complexity class of Arora&Ge. Before that, we need to recall some basic complexity results about Gröbner bases. Gröbner bases Complexity Results Gröbner basis is probably the main tool allowing to solve non-linear system of finite fields. From an algorithmic point of view, Lazard[22] showed that computing the Gröbner basis for a system of polynomialsisequivalenttoperformagaussianeliminationonthemacaulaymatrices[23]m acaulay d,m ford,1 d DforsomeintegerD.Moreover,themostefficientknownalgorithmssuchasF 5 [15] reduce Gröbner basis computations to a series of Gaussian eliminations on matrices of increasing sizes. Definition2(MacaulayMatrix[23]).Letf 1,...,f m Z q [x 1,...,x n ].TheMacaulaymatrixM acaulay d,m (f 1,...,f m ) of degree d is defined as follows: list horizontally all the degree d monomials from smallest to largest sorted by some fixed admissible monomial ordering. The smallest monomial comes last. Multiplyeachf i byallmonomialst i,j ofdegreed d i whered i =deg(f i ). Finally,constructthe coefficient matrix for the resulting system: M acaulay d,m (f 1,...,f m ):= (t 1,1,f 1 ) (t 1,2,f 1 ). (t m,1,f m ) (t m,2,f m ).. monomialsofdegree dsortedfor < Theorem3([22]). Letf =(f 1,...,f m ) (Z q [x 1,...,x n ]) m and <beamonomialordering.there existsapositiveintegerdforwhichgaussianeliminationonallm acaulay d,m = (f 1,...,f m )matrices ford,1 d DcomputesaGröbnerbasisof f 1,...,f m w.r.t.to <.ThedegreeDwillbecalled degreeofregularityoff 1,...,f m. Consequently, the complexity of computing a Gröbner basis is bounded by the complexity of performing Gaussian elimination on the Macaulay matrix in some degree D. Roughly, the complexityofcomputingagröbnerbasiswithanalgorithmbasedonthedegreeofregularity(suchas but notlimitedtoo Buchberger salgorithm,f 4,F 5 [15,11,12,14])is: (( ) n+d ω ) O, (1) D where2 ω<3isthelinearalgebraconstant,anddisthedegreeofsemi-regularityofthesystem. Ingeneral,computingthedegreeofregularityofasystemisadifficultproblem.However,itis knownforaspecificfamilyofpolynomialsystems[6,8,7,9].

4 On the complexity of the Arora-Ge Algorithm against LWE 95 Definition4(Semi-regularSequence[8]). Letm >n,andf 1,...,f m Z q [x 1,...,x n ]behomogeneouspolynomialsofdegreesd 1,...,d m respectivelyanditheidealgeneratedbythesepolynomials.thesystemissaidtobeasemi-regularsequenceifthehilbertseries[13]ofiw.r.t.thegrevlex order is: [ m H I (z)= i=1 (1 z d ] i) (1 z) n, (2) + where [S] + denotestheseriesobtainedbytruncatingsbeforetheindexofitsfirstnon-positive coefficient. Thus, the degree of regularity D involved in Theorem 3 for a semi-regular sequence is: Improving Arora-Ge Approach 1+deg(H I ). We briefly detail below the linearization approach of Arora-Ge. We then discuss whether Gröbner basescanbeusedinthiscontext. Basic Arora-Ge Algorithm A Linerization Approach The idea of[5] is to generate a non-linear noise-free system of equations from LWE samples. This is due to the following well-known feature of a Gaussian noise: Lemma5.LetC>0beaconstant.Itholdsthat: Pr[e $ χ α,q : e >C σ] e O( C2). As a consequence, elements sampled from a Gaussian distribution only takes values on a(small) subset [ C σ,...,c σ]of Z q withhighprobability. Fromnowon,wesett=C σ. Wecanreinterpret Lemma 5 algebraically by considering the polynomial: P(X)=X t i=1 (X+i)(X i). ClearlyPisofdegree2t+1 O(σ). Thus,ife $ χ α,q,thenp(e) =0withprobabilityatleast 1 e O( C2). Fori 1,let (a i, a i,s +e i )=(a i,b i ) Z n $ q Z q.ife i χ α,q,then P ( a i, a i,s b i ) =0, (3) withprobabilityatleast1 e O( C2). Asaconsequence,eachsample (a i, a i,s +e i ) = (a i,b i ) Z n q Z q allowstogenerateanon-linearequationofdegree2t+1inthencomponentsofthesecret s. TheideaofArora&Geisthentogeneratesufficientlymanyequationsasin(3)toperforma linearization.however,onehastochoosetheconstant denotedbyc AG occurringinlemma5 sufficientlybigsothatallerrorsgeneratedlieswithhighprobabilityin[ C AG σ,...,c AG σ] Z q, i.e.thesecretsisindeedacommonsolutionofthem AG equationsconstructedasin(3).tothisend, we set: p f = M AG e O(C2 AG ). Thisistheprobablythatthesecrets Z n qisnotsolutionofthesystems AG generatedfromm AG equationsasin(3),i.e.theprobabilityoffailureofarora-geapproach.letalsod AG =2C AG σ+1 bethedegreeoftheequationsoccuringins AG.Accordingto[5],takingC AG Õ(σ)allowstomake the probability of failure negligible. Tosummarize,Arora-GeapproachreducestolinearizeatsystemofM AG equationsofdegree D AG =2C AG σ+1 Õ(σ 2 ).Moreover,correctnessofthisapproachcanbeproven:

5 96 WMC&SCC2012 Theorem6.[5]LetD AG <q.thesystemobtainedbylinearizingm AG =O ( q log(q) ( n+d AG D AG ) σ )= n O(D AG) =2Õ(D AG) equationsasin(3)hasatmostonesolutionwithhighprobability. The time complexity of the basic Arora-Ge approach is then C plx AG =no(d AG) =2Õ(σ2) =2Õ(n2ε). Notealsothisalgorithmalsorequires2Õ(n2ε) LWEsamplesforperformingthelinearization. From Linerization to Gröbner Bases ThequestionwetrytoaddresshereiswhetherthecomplexityC plx AG canbeimprovedbyusing Gröbnerbasesinsteadoflinearization.TherationalisthatyoucandecreasetheconstantC AG (and sothedegreeoftheequations)toavaluesmallerthanõ(n 2 ε )byconsideringlessequations(whilst keepingtheprobabilityp f offailuresimilarinbotherapproaches).however,thecostofthesolving stepincreasesinceonehastocomputeagröbnerbasis. Thequestionisthentofind ifany a tradeoff allowing to improve upon linearization. Todoso,wewillconsideranumberofequationsoftheform θ M AG,with θ >1(θ=1isthe basic Arora-Ge). We want to keep the probability of failure similar for the linearization and Gröbner basisapproaches.asaconsequence,weneedtotakeaconstantc θ suchthat: p f = θ MAG e O(C2 θ ). AneasycalculationleadstoC θ Õ ( C θ AG ).Thus,decreasingthenumberofequationsfromM AG to θ MAG allowstodividetheconstantc AG byafactor θ.thedegreeoftheequationswearedoing toconsideristhenequalto2σ C θ +1 Õ ( σ 2 θ ). Thequestionisnowtofindagoodcandidatefor θ.typically,if θistoobigthenyouwillgreatly decrease the number of equations, but the cost of the solving step will become prohibitive and the total complexity will be worth than for a linearization. Wehaveconsideredaθoftheform: θ=n 2 β,forsome β 0(notethatwegetthebasicArora- Gebytaking β =0). Inthisnewsetting,wegetaconstantC β =n ε β. Wehavethentosolvea systemhavingm β = n2 β MAG 2Õ(n2(ε β)) equationsofdegreed β =Õ(n 2 ε β ). Wedenotesuch systembys GB (β). ThequestionistodeterminethecomplexityC plx GB AG (β)ofsolvings AG(β).Thisreducestostudy itsdegreeofregularityd β reg.givencurrentalgorithms,thespecificstructureofthesystemdoesnot allowtosolveitfasterthanrandomsystems.asaconsequence,weassumethatd β regisnotbigger thanthedegreeofregularityofasemi-regularsystemofthesamesize 2,namely: where: D β reg 1+deg(H β), H β (z)= [ ] (1 z D β) M β (1 z) n, + where [.] + denotestheseriesobtainedbytruncatingbeforetheindexofitsfirstnon-positivecoefficient. We present below some experiments performed for β = 1/5. We have computed explicitly the complexities for both approaches: linearization and Gröbner bases. As suggested in[27], 2 Wehaveperformedfewexperimentsforsmallparameters.Theexperimentsseemtoconfirmthishypothesis.

6 On the complexity of the Arora-Ge Algorithm against LWE 97 weconsideredq n 2 and α =1/( ( ) n log 2 n)weplottedbelowthespeed-upweobtained,i.e. C plx GB AG log (β) 2 (y-axis)forn,0 n WecanseethatGröbnerbasesallowtoimprove C plx AG the complexity of the basic Arora-Ge when n 5000(x-axis). Note that further experiments are requiredtoconfirmthisbehaviorwhenntendstoinfinity 3 However,theformofthespeed-upalsotendstosuggestthatweonlyimprovefromaconstantC plx AG. change the asymptotical behavior of the Arora&Ge approach. we mention that we are currently consideringseveralformsforthe β.inparticular, βwhichisnotaconstantbutafunctionofn.asa conclusion, we also emphasize that Arora-Ge needs exponential(or subexponetial) number of LWE samples. For most cryptosystems based on LWE, you have access to much less samples, typically polynomially-many. In this situation, you have then not enough samples to perform the linearization andtheonlyoptiontomountthearora&geapproachistosolvethesystembyusinggröbnerbases. References [1] A. Akavia, S. Goldwasser, and V. Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In O. Reingold, editor, TCC, volume 5444 of Lecture Notes in Computer Science, pages Springer Verlag, [2]M.R.AlbrechtandC.Cid.Coldbootkeyrecoverybysolvingpolynomialsystemswithnoise. In J. Lopez and G. Tsudik, editors, ACNS, volume 6715 of Lecture Notes in Computer Science, pages 57 72, [3] M. R. Albrecht and K. G. Paterson. Breaking an identity-based encryption scheme based on dhies. In L. Chen, editor, IMA Int. Conf., volume 7089 of Lecture Notes in Computer Science, pages Springer Verlag, [4] M. R. Albrecht, P. Farshim, J.-C. Faugère, and L. Perret. Polly Cracker, revisited. In Advances in Cryptology ASIACRYPT 2011, volume 7073 of Lecture Notes in Computer Science, pages , Berlin, Heidelberg, New York, Springer Verlag. full version available as Cryptology eprint Archive, Report 2011/289, Notethatthedegreeoftheequationsinvolvedbeinghuge,itbecomesrathercostlytojustexpandtheHilbertseriesfor the systems considered.

7 98 WMC&SCC2012 [5]S.AroraandR.Ge.Newalgorithmsforlearninginpresenceoferrors.InL.Aceto,M.Henzinger, and J. Sgall, editors, ICALP, volume 6755 of Lecture Notes in Computer Science, pages Springer Verlag, [6] M. Bardet. Étude des systèmes algébriques surdéterminés. Applications aux codes correcteurs et à la cryptographie. PhD thesis, Université de Paris VI, [7] M. Bardet, J.-C. Faugère, and B. Salvy. Complexity study of Gröbner basis computation. Technical report, INRIA, [8] M. Bardet, J.-C. Faugère, and B. Salvy. On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In Proc. International Conference on Polynomial System Solving(ICPSS), pages 71 75, [9] M. Bardet, J.-C. Faugère, B. Salvy, and B.-Y. Yang. Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In Proc. of MEGA 2005, Eighth International Symposium on Effective Methods in Algebraic Geometry, [10] Z. Brakerski and V. Vaikuntanathan. Efficient fully homomorphic encryption from(standard) LWE. In R. Ostrovsky, editor, IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, pages IEEE, [11] B. Buchberger. Ein Algorithmus zum Auffinden der Basiselemente des Restklassenringes nach einem nulldimensionalen Polynomideal. PhD thesis, University of Innsbruck, [12]B.Buchberger,G.E.Collins,R.G.K.Loos,andR.Albrecht.Computeralgebrasymbolicand algebraic computation. SIGSAM Bull., 16(4):5 5, [13] D. A. Cox, J. B. Little, and D. O Shea. Ideals, Varieties and Algorithms. Springer Verlag, [14] J.-C. Faugère. A new efficient algorithm for computing Gröbner bases(f4). Journal of Pure and Applied Algebra, 139:61 88, June [15] J.-C. Faugère. A new efficient algorithm for computing Gröbner bases without reduction to zero(f5). In T. Mora, editor, Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation ISSAC, pages ACM Press, July isbn: [16] J.-C. Faugère and A. Joux. Algebraic cryptanalysis of hidden field equation(hfe) cryptosystems using gröbner bases. In D. Boneh, editor, CRYPTO, volume 2729 of Lecture Notes in Computer Science, pages Springer Verlag, [17] J.-C. Faugère and L. Perret. Polynomial equivalence problems: Algorithmic and theoretical aspects. In S. Vaudenay, editor, Advances in Cryptology EUROCRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages Springer Verlag, [18] J.-C. Faugère, F. L. dit Vehel, and L. Perret. Cryptanalysis of minrank. In Wagner[28], pages [19] J.-C. Faugère, A. Otmani, L. Perret, and J.-P. Tillich. In Advances in Cryptology EURO- CRYPT 2010, volume 6110 of Lecture Notes in Computer Science, pages Springer Verlag, [20] J.-C. Faugère, L. Perret, C. Petit, and G. Renault. Improving the complexity of index calculus algorithms in elliptic curves over binary fields. In D. Pointcheval and T. Johansson, editors, Advances in Cryptology- EUROCRYPT 2012, volume 7237 of Lecture Notes in Computer Science, pages Springer Verlag, 2012.

8 On the complexity of the Arora-Ge Algorithm against LWE 99 [21] C. Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University, Available at [22] D. Lazard. Gröbner-bases, Gaussian elimination and resolution of systems of algebraic equations. In Proceedings of the European Computer Algebra Conference on Computer Algebra, volume 162 of Lecture Notes in Computer Science, Berlin, Heidelberg, New York, Springer Verlag. [23] F. S. Macaulay. On some formula in elimination. London Mathematical Society, 1(33):3 27, [24] C. Peikert. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In M. Mitzenmacher, editor, Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, pages ACM, [25] C. Peikert, V. Vaikuntanathan, and B. Waters. A framework for efficient and composable oblivious transfer. In Wagner[28], pages [26] O. Regev. On lattices, learning with errors, random linear codes, and cryptography. In H. N. Gabow and R. Fagin, editors, STOC, pages ACM, [27] O. Regev. On lattices, learning with errors, random linear codes, and cryptography. J. ACM, 56(6), [28] D. Wagner, editor. Advances in Cryptology- CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, Proceedings, volume 5157 of Lecture Notes in Computer Science, Springer Verlag. M. R. Albrecht INRIA, LIP6, CNRS malb@lip6.fr C. Cid Royal Holloway, University of London carlos.cid@rhul.ac.uk J.-C. Faugère INRIA, LIP6, CNRS jean-charles.faugere@inria.fr R. Fitzpatrick Royal Holloway, University of London robert.fitzpatrick.2010@live.rhul.ac.uk L. Perret INRIA, LIP6, CNRS ludovic.perret@lip6.fr

Solving LWE with BKW

Solving LWE with BKW Martin R. Albrecht 1 Jean-Charles Faugére 2,3 1,4 Ludovic Perret 2,3 ISG, Royal Holloway, University of London INRIA CNRS IIS, Academia Sinica, Taipei, Taiwan PKC 2014, Buenos Aires, Argentina, 28th March

More information

Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis

Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Jean-Charles Faugère 1, Ayoub Otmani 2,3, Ludovic Perret 1, and Jean-Pierre Tillich 2 1 SALSA Project - INRIA (Centre

More information

On Newton-Raphson iteration for multiplicative inverses modulo prime powers

On Newton-Raphson iteration for multiplicative inverses modulo prime powers On Newton-Raphson iteration for multiplicative inverses modulo prime powers Jean-Guillaume Dumas To cite this version: Jean-Guillaume Dumas. On Newton-Raphson iteration for multiplicative inverses modulo

More information

Gröbner Bases Techniques in Post-Quantum Cryptography

Gröbner Bases Techniques in Post-Quantum Cryptography Gröbner Bases Techniques in Post-Quantum Cryptography Ludovic Perret Sorbonne Universités, UPMC Univ Paris 06, INRIA Paris LIP6, PolSyS Project, Paris, France Post-Quantum Cryptography Winter School, Fukuoka,

More information

CS Topics in Cryptography January 28, Lecture 5

CS Topics in Cryptography January 28, Lecture 5 CS 4501-6501 Topics in Cryptography January 28, 2015 Lecture 5 Lecturer: Mohammad Mahmoody Scribe: Ameer Mohammed 1 Learning with Errors: Motivation An important goal in cryptography is to find problems

More information

Factorisation of RSA-704 with CADO-NFS

Factorisation of RSA-704 with CADO-NFS Factorisation of RSA-704 with CADO-NFS Shi Bai, Emmanuel Thomé, Paul Zimmermann To cite this version: Shi Bai, Emmanuel Thomé, Paul Zimmermann. Factorisation of RSA-704 with CADO-NFS. 2012. HAL Id: hal-00760322

More information

On the relation of the Mutant strategy and the Normal Selection strategy

On the relation of the Mutant strategy and the Normal Selection strategy On the relation of the Mutant strategy and the Normal Selection strategy Martin Albrecht 1 Carlos Cid 2 Jean-Charles Faugère 1 Ludovic Perret 1 1 SALSA Project -INRIA, UPMC, Univ Paris 06 2 Information

More information

Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages

Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages Jean-Charles Faugère and Ludovic Perret SALSA Project INRIA, Centre Paris-Rocquencourt UPMC, Univ Paris 06, LIP6 CNRS, UMR 7606, LIP6

More information

Analysis of Boyer and Moore s MJRTY algorithm

Analysis of Boyer and Moore s MJRTY algorithm Analysis of Boyer and Moore s MJRTY algorithm Laurent Alonso, Edward M. Reingold To cite this version: Laurent Alonso, Edward M. Reingold. Analysis of Boyer and Moore s MJRTY algorithm. Information Processing

More information

Polly Cracker, revisited, revisited

Polly Cracker, revisited, revisited Polly Cracker, revisited, revisited Gottfried Herold Ruhr-Universität Bochum Horst Görtz Insitute for IT-Security Bochum, Germany gottfried.herold@rub.de Abstract. In this paper, we consider the Polly

More information

Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma.

Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma. Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma. Loïc De Pontual, Delphine Trochet, Franck Bourdeaut, Sophie Thomas, Heather Etchevers, Agnes Chompret, Véronique Minard,

More information

A Simple Proof of P versus NP

A Simple Proof of P versus NP A Simple Proof of P versus NP Frank Vega To cite this version: Frank Vega. A Simple Proof of P versus NP. 2016. HAL Id: hal-01281254 https://hal.archives-ouvertes.fr/hal-01281254 Submitted

More information

On size, radius and minimum degree

On size, radius and minimum degree On size, radius and minimum degree Simon Mukwembi To cite this version: Simon Mukwembi. On size, radius and minimum degree. Discrete Mathematics and Theoretical Computer Science, DMTCS, 2014, Vol. 16 no.

More information

A new simple recursive algorithm for finding prime numbers using Rosser s theorem

A new simple recursive algorithm for finding prime numbers using Rosser s theorem A new simple recursive algorithm for finding prime numbers using Rosser s theorem Rédoane Daoudi To cite this version: Rédoane Daoudi. A new simple recursive algorithm for finding prime numbers using Rosser

More information

Easter bracelets for years

Easter bracelets for years Easter bracelets for 5700000 years Denis Roegel To cite this version: Denis Roegel. Easter bracelets for 5700000 years. [Research Report] 2014. HAL Id: hal-01009457 https://hal.inria.fr/hal-01009457

More information

On Symmetric Norm Inequalities And Hermitian Block-Matrices

On Symmetric Norm Inequalities And Hermitian Block-Matrices On Symmetric Norm Inequalities And Hermitian lock-matrices Antoine Mhanna To cite this version: Antoine Mhanna On Symmetric Norm Inequalities And Hermitian lock-matrices 015 HAL Id: hal-0131860

More information

A non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications

A non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications A non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications Alexandre Sedoglavic To cite this version: Alexandre Sedoglavic. A non-commutative algorithm for multiplying (7 7) matrices

More information

The Accelerated Euclidean Algorithm

The Accelerated Euclidean Algorithm The Accelerated Euclidean Algorithm Sidi Mohamed Sedjelmaci To cite this version: Sidi Mohamed Sedjelmaci The Accelerated Euclidean Algorithm Laureano Gonzales-Vega and Thomas Recio Eds 2004, University

More information

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields Bull. Math. Soc. Sci. Math. Roumanie Tome 56(104) No. 2, 2013, 217 228 Computing Minimal Polynomial of Matrices over Algebraic Extension Fields by Amir Hashemi and Benyamin M.-Alizadeh Abstract In this

More information

Practical Analysis of Key Recovery Attack against Search-LWE Problem

Practical Analysis of Key Recovery Attack against Search-LWE Problem Practical Analysis of Key Recovery Attack against Search-LWE Problem The 11 th International Workshop on Security, Sep. 13 th 2016 Momonari Kudo, Junpei Yamaguchi, Yang Guo and Masaya Yasuda 1 Graduate

More information

Lower bound of the covering radius of binary irreducible Goppa codes

Lower bound of the covering radius of binary irreducible Goppa codes Lower bound of the covering radius of binary irreducible Goppa codes Sergey Bezzateev, Natalia Shekhunova To cite this version: Sergey Bezzateev, Natalia Shekhunova. Lower bound of the covering radius

More information

Lazy Modulus Switching for the BKW Algorithm on LWE

Lazy Modulus Switching for the BKW Algorithm on LWE Lazy Modulus Switching for the BKW Algorithm on LWE Martin R. Albrecht 1, Jean-Charles Faugre 3,,4, Robert Fitzpatrick 5, and Ludovic Perret,3,4 1 Technical University of Denmark, Denmark Sorbonne Universits,

More information

Smart Bolometer: Toward Monolithic Bolometer with Smart Functions

Smart Bolometer: Toward Monolithic Bolometer with Smart Functions Smart Bolometer: Toward Monolithic Bolometer with Smart Functions Matthieu Denoual, Gilles Allègre, Patrick Attia, Olivier De Sagazan To cite this version: Matthieu Denoual, Gilles Allègre, Patrick Attia,

More information

Completeness of the Tree System for Propositional Classical Logic

Completeness of the Tree System for Propositional Classical Logic Completeness of the Tree System for Propositional Classical Logic Shahid Rahman To cite this version: Shahid Rahman. Completeness of the Tree System for Propositional Classical Logic. Licence. France.

More information

Lattice Reduction Attacks on HE Schemes. Martin R. Albrecht 15/03/2018

Lattice Reduction Attacks on HE Schemes. Martin R. Albrecht 15/03/2018 Lattice Reduction Attacks on HE Schemes Martin R. Albrecht 15/03/2018 Learning with Errors The Learning with Errors (LWE) problem was defined by Oded Regev. 1 Given (A, c) with uniform A Z m n q, uniform

More information

Dispersion relation results for VCS at JLab

Dispersion relation results for VCS at JLab Dispersion relation results for VCS at JLab G. Laveissiere To cite this version: G. Laveissiere. Dispersion relation results for VCS at JLab. Compton Scattering from Low to High Momentum Transfer, Mar

More information

Classical hardness of Learning with Errors

Classical hardness of Learning with Errors Classical hardness of Learning with Errors Adeline Langlois Aric Team, LIP, ENS Lyon Joint work with Z. Brakerski, C. Peikert, O. Regev and D. Stehlé Adeline Langlois Classical Hardness of LWE 1/ 13 Our

More information

b-chromatic number of cacti

b-chromatic number of cacti b-chromatic number of cacti Victor Campos, Claudia Linhares Sales, Frédéric Maffray, Ana Silva To cite this version: Victor Campos, Claudia Linhares Sales, Frédéric Maffray, Ana Silva. b-chromatic number

More information

Full-order observers for linear systems with unknown inputs

Full-order observers for linear systems with unknown inputs Full-order observers for linear systems with unknown inputs Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu To cite this version: Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu. Full-order observers

More information

Gröbner Bases in Public-Key Cryptography

Gröbner Bases in Public-Key Cryptography Gröbner Bases in Public-Key Cryptography Ludovic Perret SPIRAL/SALSA LIP6, Université Paris 6 INRIA ludovic.perret@lip6.fr ECRYPT PhD SUMMER SCHOOL Emerging Topics in Cryptographic Design and Cryptanalysis

More information

On Poincare-Wirtinger inequalities in spaces of functions of bounded variation

On Poincare-Wirtinger inequalities in spaces of functions of bounded variation On Poincare-Wirtinger inequalities in spaces of functions of bounded variation Maïtine Bergounioux To cite this version: Maïtine Bergounioux. On Poincare-Wirtinger inequalities in spaces of functions of

More information

Classical hardness of the Learning with Errors problem

Classical hardness of the Learning with Errors problem Classical hardness of the Learning with Errors problem Adeline Langlois Aric Team, LIP, ENS Lyon Joint work with Z. Brakerski, C. Peikert, O. Regev and D. Stehlé August 12, 2013 Adeline Langlois Hardness

More information

Negative results on acyclic improper colorings

Negative results on acyclic improper colorings Negative results on acyclic improper colorings Pascal Ochem To cite this version: Pascal Ochem. Negative results on acyclic improper colorings. Stefan Felsner. 005 European Conference on Combinatorics,

More information

Analyzing large-scale spike trains data with spatio-temporal constraints

Analyzing large-scale spike trains data with spatio-temporal constraints Analyzing large-scale spike trains data with spatio-temporal constraints Hassan Nasser, Olivier Marre, Selim Kraria, Thierry Viéville, Bruno Cessac To cite this version: Hassan Nasser, Olivier Marre, Selim

More information

Case report on the article Water nanoelectrolysis: A simple model, Journal of Applied Physics (2017) 122,

Case report on the article Water nanoelectrolysis: A simple model, Journal of Applied Physics (2017) 122, Case report on the article Water nanoelectrolysis: A simple model, Journal of Applied Physics (2017) 122, 244902 Juan Olives, Zoubida Hammadi, Roger Morin, Laurent Lapena To cite this version: Juan Olives,

More information

Widely Linear Estimation with Complex Data

Widely Linear Estimation with Complex Data Widely Linear Estimation with Complex Data Bernard Picinbono, Pascal Chevalier To cite this version: Bernard Picinbono, Pascal Chevalier. Widely Linear Estimation with Complex Data. IEEE Transactions on

More information

The Windy Postman Problem on Series-Parallel Graphs

The Windy Postman Problem on Series-Parallel Graphs The Windy Postman Problem on Series-Parallel Graphs Francisco Javier Zaragoza Martínez To cite this version: Francisco Javier Zaragoza Martínez. The Windy Postman Problem on Series-Parallel Graphs. Stefan

More information

On one class of permutation polynomials over finite fields of characteristic two *

On one class of permutation polynomials over finite fields of characteristic two * On one class of permutation polynomials over finite fields of characteristic two * Leonid Bassalygo, Victor A. Zinoviev To cite this version: Leonid Bassalygo, Victor A. Zinoviev. On one class of permutation

More information

Classical hardness of Learning with Errors

Classical hardness of Learning with Errors Classical hardness of Learning with Errors Zvika Brakerski 1 Adeline Langlois 2 Chris Peikert 3 Oded Regev 4 Damien Stehlé 2 1 Stanford University 2 ENS de Lyon 3 Georgia Tech 4 New York University Our

More information

Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length

Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length Tudor Petrescu, Jacques Oksman To cite this version: Tudor Petrescu, Jacques Oksman. Sensitivity of

More information

Evolution of the cooperation and consequences of a decrease in plant diversity on the root symbiont diversity

Evolution of the cooperation and consequences of a decrease in plant diversity on the root symbiont diversity Evolution of the cooperation and consequences of a decrease in plant diversity on the root symbiont diversity Marie Duhamel To cite this version: Marie Duhamel. Evolution of the cooperation and consequences

More information

On path partitions of the divisor graph

On path partitions of the divisor graph On path partitions of the divisor graph Paul Melotti, Eric Saias To cite this version: Paul Melotti, Eric Saias On path partitions of the divisor graph 018 HAL Id: hal-0184801 https://halarchives-ouvertesfr/hal-0184801

More information

On infinite permutations

On infinite permutations On infinite permutations Dmitri G. Fon-Der-Flaass, Anna E. Frid To cite this version: Dmitri G. Fon-Der-Flaass, Anna E. Frid. On infinite permutations. Stefan Felsner. 2005 European Conference on Combinatorics,

More information

Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis

Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Algebraic Cryptanalysis of Compact McEliece s Variants Toward a Complexity Analysis Jean-Charles Faugère 1, Ayoub Otmani 2,3, Ludovic Perret 1, and Jean-Pierre Tillich 2 1 SALSA Project - INRIA (Centre

More information

Thomas Lugand. To cite this version: HAL Id: tel

Thomas Lugand. To cite this version: HAL Id: tel Contribution à la Modélisation et à l Optimisation de la Machine Asynchrone Double Alimentation pour des Applications Hydrauliques de Pompage Turbinage Thomas Lugand To cite this version: Thomas Lugand.

More information

The Mahler measure of trinomials of height 1

The Mahler measure of trinomials of height 1 The Mahler measure of trinomials of height 1 Valérie Flammang To cite this version: Valérie Flammang. The Mahler measure of trinomials of height 1. Journal of the Australian Mathematical Society 14 9 pp.1-4.

More information

On the Griesmer bound for nonlinear codes

On the Griesmer bound for nonlinear codes On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas

More information

On Symmetric Norm Inequalities And Hermitian Block-Matrices

On Symmetric Norm Inequalities And Hermitian Block-Matrices On Symmetric Norm Inequalities And Hermitian lock-matrices Antoine Mhanna To cite this version: Antoine Mhanna On Symmetric Norm Inequalities And Hermitian lock-matrices 016 HAL Id: hal-0131860

More information

Sparse multivariate factorization by mean of a few bivariate factorizations

Sparse multivariate factorization by mean of a few bivariate factorizations Sparse multivariate factorization by mean of a few bivariate factorizations Bernard Parisse To cite this version: Bernard Parisse. Sparse multivariate factorization by mean of a few bivariate factorizations.

More information

approximation results for the Traveling Salesman and related Problems

approximation results for the Traveling Salesman and related Problems approximation results for the Traveling Salesman and related Problems Jérôme Monnot To cite this version: Jérôme Monnot. approximation results for the Traveling Salesman and related Problems. Information

More information

Lazy Modulus Switching for the BKW Algorithm on LWE

Lazy Modulus Switching for the BKW Algorithm on LWE Lazy Modulus Switching for the BKW Algorithm on LWE Martin R. Albrecht 1, Jean-Charles Faugère 3,2,4, Robert Fitzpatrick 5, and Ludovic Perret 2,3,4 1 Technical University of Denmark, Denmark 2 Sorbonne

More information

Trench IGBT failure mechanisms evolution with temperature and gate resistance under various short-circuit conditions

Trench IGBT failure mechanisms evolution with temperature and gate resistance under various short-circuit conditions Trench IGBT failure mechanisms evolution with temperature and gate resistance under various short-circuit conditions Adel Benmansour, Stephane Azzopardi, Jean-Christophe Martin, Eric Woirgard To cite this

More information

Secure Delegation of Elliptic-Curve Pairing

Secure Delegation of Elliptic-Curve Pairing Secure Delegation of Elliptic-Curve Pairing Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel Mccullagh, David Naccache, Michael Scott To cite this version: Benoît Chevallier-Mames, Jean-Sébastien Coron,

More information

Differential approximation results for the Steiner tree problem

Differential approximation results for the Steiner tree problem Differential approximation results for the Steiner tree problem Marc Demange, Jérôme Monnot, Vangelis Paschos To cite this version: Marc Demange, Jérôme Monnot, Vangelis Paschos. Differential approximation

More information

Antipodal radiation pattern of a patch antenna combined with superstrate using transformation electromagnetics

Antipodal radiation pattern of a patch antenna combined with superstrate using transformation electromagnetics Antipodal radiation pattern of a patch antenna combined with superstrate using transformation electromagnetics Mark Clemente Arenas, Anne-Claire Lepage, Xavier Begaud To cite this version: Mark Clemente

More information

Exact Comparison of Quadratic Irrationals

Exact Comparison of Quadratic Irrationals Exact Comparison of Quadratic Irrationals Phuc Ngo To cite this version: Phuc Ngo. Exact Comparison of Quadratic Irrationals. [Research Report] LIGM. 20. HAL Id: hal-0069762 https://hal.archives-ouvertes.fr/hal-0069762

More information

Dissipative Systems Analysis and Control, Theory and Applications: Addendum/Erratum

Dissipative Systems Analysis and Control, Theory and Applications: Addendum/Erratum Dissipative Systems Analysis and Control, Theory and Applications: Addendum/Erratum Bernard Brogliato To cite this version: Bernard Brogliato. Dissipative Systems Analysis and Control, Theory and Applications:

More information

Passerelle entre les arts : la sculpture sonore

Passerelle entre les arts : la sculpture sonore Passerelle entre les arts : la sculpture sonore Anaïs Rolez To cite this version: Anaïs Rolez. Passerelle entre les arts : la sculpture sonore. Article destiné à l origine à la Revue de l Institut National

More information

New estimates for the div-curl-grad operators and elliptic problems with L1-data in the half-space

New estimates for the div-curl-grad operators and elliptic problems with L1-data in the half-space New estimates for the div-curl-grad operators and elliptic problems with L1-data in the half-space Chérif Amrouche, Huy Hoang Nguyen To cite this version: Chérif Amrouche, Huy Hoang Nguyen. New estimates

More information

The FLRW cosmological model revisited: relation of the local time with th e local curvature and consequences on the Heisenberg uncertainty principle

The FLRW cosmological model revisited: relation of the local time with th e local curvature and consequences on the Heisenberg uncertainty principle The FLRW cosmological model revisited: relation of the local time with th e local curvature and consequences on the Heisenberg uncertainty principle Nathalie Olivi-Tran, Paul M Gauthier To cite this version:

More information

Soundness of the System of Semantic Trees for Classical Logic based on Fitting and Smullyan

Soundness of the System of Semantic Trees for Classical Logic based on Fitting and Smullyan Soundness of the System of Semantic Trees for Classical Logic based on Fitting and Smullyan Shahid Rahman To cite this version: Shahid Rahman. Soundness of the System of Semantic Trees for Classical Logic

More information

Vibro-acoustic simulation of a car window

Vibro-acoustic simulation of a car window Vibro-acoustic simulation of a car window Christophe Barras To cite this version: Christophe Barras. Vibro-acoustic simulation of a car window. Société Française d Acoustique. Acoustics 12, Apr 12, Nantes,

More information

Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding

Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding Jérémy Aghaei Mazaheri, Christine Guillemot, Claude Labit To cite this version: Jérémy Aghaei Mazaheri, Christine Guillemot,

More information

A non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications

A non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications A non-commutative algorithm for multiplying (7 7) matrices using 250 multiplications Alexandre Sedoglavic To cite this version: Alexandre Sedoglavic. A non-commutative algorithm for multiplying (7 7) matrices

More information

Fast Computation of Moore-Penrose Inverse Matrices

Fast Computation of Moore-Penrose Inverse Matrices Fast Computation of Moore-Penrose Inverse Matrices Pierre Courrieu To cite this version: Pierre Courrieu. Fast Computation of Moore-Penrose Inverse Matrices. Neural Information Processing - Letters and

More information

Unfolding the Skorohod reflection of a semimartingale

Unfolding the Skorohod reflection of a semimartingale Unfolding the Skorohod reflection of a semimartingale Vilmos Prokaj To cite this version: Vilmos Prokaj. Unfolding the Skorohod reflection of a semimartingale. Statistics and Probability Letters, Elsevier,

More information

Comparison between XL and Gröbner Basis Algorithms

Comparison between XL and Gröbner Basis Algorithms Comparison between XL and Gröbner Basis Algorithms Gwénolé Ars 1, Jean-Charles Faugère 2, Hideki Imai 3, Mitsuru Kawazoe 4, and Makoto Sugita 5 1 IRMAR, University of Rennes 1 Campus de Beaulieu 35042

More information

Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields

Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 278-283 Analysis of Hidden Field Equations Cryptosystem over Odd-Characteristic Fields N. G. Kuzmina and E. B. Makhovenko Saint-Petersburg

More information

A proximal approach to the inversion of ill-conditioned matrices

A proximal approach to the inversion of ill-conditioned matrices A proximal approach to the inversion of ill-conditioned matrices Pierre Maréchal, Aude Rondepierre To cite this version: Pierre Maréchal, Aude Rondepierre. A proximal approach to the inversion of ill-conditioned

More information

Cutwidth and degeneracy of graphs

Cutwidth and degeneracy of graphs Cutwidth and degeneracy of graphs Benoit Kloeckner To cite this version: Benoit Kloeckner. Cutwidth and degeneracy of graphs. IF_PREPUB. 2009. HAL Id: hal-00408210 https://hal.archives-ouvertes.fr/hal-00408210v1

More information

Impedance Transmission Conditions for the Electric Potential across a Highly Conductive Casing

Impedance Transmission Conditions for the Electric Potential across a Highly Conductive Casing Impedance Transmission Conditions for the Electric Potential across a Highly Conductive Casing Hélène Barucq, Aralar Erdozain, David Pardo, Victor Péron To cite this version: Hélène Barucq, Aralar Erdozain,

More information

Axiom of infinity and construction of N

Axiom of infinity and construction of N Axiom of infinity and construction of N F Portal To cite this version: F Portal. Axiom of infinity and construction of N. 2015. HAL Id: hal-01162075 https://hal.archives-ouvertes.fr/hal-01162075 Submitted

More information

Stickelberger s congruences for absolute norms of relative discriminants

Stickelberger s congruences for absolute norms of relative discriminants Stickelberger s congruences for absolute norms of relative discriminants Georges Gras To cite this version: Georges Gras. Stickelberger s congruences for absolute norms of relative discriminants. Journal

More information

From Unstructured 3D Point Clouds to Structured Knowledge - A Semantics Approach

From Unstructured 3D Point Clouds to Structured Knowledge - A Semantics Approach From Unstructured 3D Point Clouds to Structured Knowledge - A Semantics Approach Christophe Cruz, Helmi Ben Hmida, Frank Boochs, Christophe Nicolle To cite this version: Christophe Cruz, Helmi Ben Hmida,

More information

Influence of a Rough Thin Layer on the Potential

Influence of a Rough Thin Layer on the Potential Influence of a Rough Thin Layer on the Potential Ionel Ciuperca, Ronan Perrussel, Clair Poignard To cite this version: Ionel Ciuperca, Ronan Perrussel, Clair Poignard. Influence of a Rough Thin Layer on

More information

Can we reduce health inequalities? An analysis of the English strategy ( )

Can we reduce health inequalities? An analysis of the English strategy ( ) Can we reduce health inequalities? An analysis of the English strategy (1997-2010) Johan P Mackenbach To cite this version: Johan P Mackenbach. Can we reduce health inequalities? An analysis of the English

More information

Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL

Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt,

More information

L institution sportive : rêve et illusion

L institution sportive : rêve et illusion L institution sportive : rêve et illusion Hafsi Bedhioufi, Sida Ayachi, Imen Ben Amar To cite this version: Hafsi Bedhioufi, Sida Ayachi, Imen Ben Amar. L institution sportive : rêve et illusion. Revue

More information

Entropies and fractal dimensions

Entropies and fractal dimensions Entropies and fractal dimensions Amelia Carolina Sparavigna To cite this version: Amelia Carolina Sparavigna. Entropies and fractal dimensions. Philica, Philica, 2016. HAL Id: hal-01377975

More information

Hybrid Approach : a Tool for Multivariate Cryptography

Hybrid Approach : a Tool for Multivariate Cryptography Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6

More information

Comparison of Harmonic, Geometric and Arithmetic means for change detection in SAR time series

Comparison of Harmonic, Geometric and Arithmetic means for change detection in SAR time series Comparison of Harmonic, Geometric and Arithmetic means for change detection in SAR time series Guillaume Quin, Béatrice Pinel-Puysségur, Jean-Marie Nicolas To cite this version: Guillaume Quin, Béatrice

More information

A new approach of the concept of prime number

A new approach of the concept of prime number A new approach of the concept of prime number Jamel Ghannouchi To cite this version: Jamel Ghannouchi. A new approach of the concept of prime number. 4 pages. 24. HAL Id: hal-3943 https://hal.archives-ouvertes.fr/hal-3943

More information

Exogenous input estimation in Electronic Power Steering (EPS) systems

Exogenous input estimation in Electronic Power Steering (EPS) systems Exogenous input estimation in Electronic Power Steering (EPS) systems Valentina Ciarla, Carlos Canudas de Wit, Franck Quaine, Violaine Cahouet To cite this version: Valentina Ciarla, Carlos Canudas de

More information

Confluence Algebras and Acyclicity of the Koszul Complex

Confluence Algebras and Acyclicity of the Koszul Complex Confluence Algebras and Acyclicity of the Koszul Complex Cyrille Chenavier To cite this version: Cyrille Chenavier. Confluence Algebras and Acyclicity of the Koszul Complex. Algebras and Representation

More information

Hardware Operator for Simultaneous Sine and Cosine Evaluation

Hardware Operator for Simultaneous Sine and Cosine Evaluation Hardware Operator for Simultaneous Sine and Cosine Evaluation Arnaud Tisserand To cite this version: Arnaud Tisserand. Hardware Operator for Simultaneous Sine and Cosine Evaluation. ICASSP 6: International

More information

On The Exact Solution of Newell-Whitehead-Segel Equation Using the Homotopy Perturbation Method

On The Exact Solution of Newell-Whitehead-Segel Equation Using the Homotopy Perturbation Method On The Exact Solution of Newell-Whitehead-Segel Equation Using the Homotopy Perturbation Method S. Salman Nourazar, Mohsen Soori, Akbar Nazari-Golshan To cite this version: S. Salman Nourazar, Mohsen Soori,

More information

Numerical modification of atmospheric models to include the feedback of oceanic currents on air-sea fluxes in ocean-atmosphere coupled models

Numerical modification of atmospheric models to include the feedback of oceanic currents on air-sea fluxes in ocean-atmosphere coupled models Numerical modification of atmospheric models to include the feedback of oceanic currents on air-sea fluxes in ocean-atmosphere coupled models Florian Lemarié To cite this version: Florian Lemarié. Numerical

More information

Unbiased minimum variance estimation for systems with unknown exogenous inputs

Unbiased minimum variance estimation for systems with unknown exogenous inputs Unbiased minimum variance estimation for systems with unknown exogenous inputs Mohamed Darouach, Michel Zasadzinski To cite this version: Mohamed Darouach, Michel Zasadzinski. Unbiased minimum variance

More information

A novel method for estimating the flicker level generated by a wave energy farm composed of devices operated in variable speed mode

A novel method for estimating the flicker level generated by a wave energy farm composed of devices operated in variable speed mode A novel method for estimating the flicker level generated by a wave energy farm composed of devices operated in variable speed mode Anne Blavette, Dara O Sullivan, Ray Alcorn, Mohamed Machmoum, Michael

More information

Reduced Models (and control) of in-situ decontamination of large water resources

Reduced Models (and control) of in-situ decontamination of large water resources Reduced Models (and control) of in-situ decontamination of large water resources Antoine Rousseau, Alain Rapaport To cite this version: Antoine Rousseau, Alain Rapaport. Reduced Models (and control) of

More information

Parameter selection in Ring-LWE-based cryptography

Parameter selection in Ring-LWE-based cryptography Parameter selection in Ring-LWE-based cryptography Rachel Player Information Security Group, Royal Holloway, University of London based on joint works with Martin R. Albrecht, Hao Chen, Kim Laine, and

More information

On the longest path in a recursively partitionable graph

On the longest path in a recursively partitionable graph On the longest path in a recursively partitionable graph Julien Bensmail To cite this version: Julien Bensmail. On the longest path in a recursively partitionable graph. 2012. HAL Id:

More information

Comment on: Sadi Carnot on Carnot s theorem.

Comment on: Sadi Carnot on Carnot s theorem. Comment on: Sadi Carnot on Carnot s theorem. Jacques Arnaud, Laurent Chusseau, Fabrice Philippe To cite this version: Jacques Arnaud, Laurent Chusseau, Fabrice Philippe. Comment on: Sadi Carnot on Carnot

More information

Influence of network metrics in urban simulation: introducing accessibility in graph-cellular automata.

Influence of network metrics in urban simulation: introducing accessibility in graph-cellular automata. Influence of network metrics in urban simulation: introducing accessibility in graph-cellular automata. Dominique Badariotti, Arnaud Banos, Diego Moreno To cite this version: Dominique Badariotti, Arnaud

More information

Posterior Covariance vs. Analysis Error Covariance in Data Assimilation

Posterior Covariance vs. Analysis Error Covariance in Data Assimilation Posterior Covariance vs. Analysis Error Covariance in Data Assimilation François-Xavier Le Dimet, Victor Shutyaev, Igor Gejadze To cite this version: François-Xavier Le Dimet, Victor Shutyaev, Igor Gejadze.

More information

Territorial Intelligence and Innovation for the Socio-Ecological Transition

Territorial Intelligence and Innovation for the Socio-Ecological Transition Territorial Intelligence and Innovation for the Socio-Ecological Transition Jean-Jacques Girardot, Evelyne Brunau To cite this version: Jean-Jacques Girardot, Evelyne Brunau. Territorial Intelligence and

More information

Parallel Repetition of entangled games on the uniform distribution

Parallel Repetition of entangled games on the uniform distribution Parallel Repetition of entangled games on the uniform distribution André Chailloux, Scarpa Giannicola To cite this version: André Chailloux, Scarpa Giannicola. Parallel Repetition of entangled games on

More information

SOLAR RADIATION ESTIMATION AND PREDICTION USING MEASURED AND PREDICTED AEROSOL OPTICAL DEPTH

SOLAR RADIATION ESTIMATION AND PREDICTION USING MEASURED AND PREDICTED AEROSOL OPTICAL DEPTH SOLAR RADIATION ESTIMATION AND PREDICTION USING MEASURED AND PREDICTED AEROSOL OPTICAL DEPTH Carlos M. Fernández-Peruchena, Martín Gastón, Maria V Guisado, Ana Bernardos, Íñigo Pagola, Lourdes Ramírez

More information

Two-step centered spatio-temporal auto-logistic regression model

Two-step centered spatio-temporal auto-logistic regression model Two-step centered spatio-temporal auto-logistic regression model Anne Gégout-Petit, Shuxian Li To cite this version: Anne Gégout-Petit, Shuxian Li. Two-step centered spatio-temporal auto-logistic regression

More information

Question order experimental constraints on quantum-like models of judgement

Question order experimental constraints on quantum-like models of judgement Question order experimental constraints on quantum-like models of judgement Patrick Cassam-Chenaï To cite this version: Patrick Cassam-Chenaï. Question order experimental constraints on quantum-like models

More information