Filtrer vos résultats
- 37
- 32
- 33
- 21
- 8
- 3
- 1
- 1
- 1
- 1
- 7
- 41
- 16
- 5
- 2
- 1
- 1
- 1
- 1
- 2
- 9
- 3
- 9
- 7
- 9
- 8
- 4
- 7
- 3
- 4
- 1
- 67
- 2
- 69
- 22
- 16
- 16
- 13
- 11
- 7
- 6
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 19
- 16
- 13
- 11
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
69 résultats
Construction of bent functions via Niho power functionsJournal of Combinatorial Theory, Series A, 2006, 113, pp.779-798 (5)
Article dans une revue
hal-00110513v1
|
|||
|
A new insight into Serre's reduction problemLinear Algebra and its Applications, 2015, 483, pp.40-100. ⟨10.1016/j.laa.2015.04.035⟩
Article dans une revue
hal-01259834v1
|
||
|
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codesDesigns, Codes and Cryptography, 2014, 73 (2), pp.641-666. ⟨10.1007/s10623-014-9967-z⟩
Article dans une revue
hal-01096172v1
|
||
Symbolic techniques for domain decomposition methodsRandolph Bank and Michael Holst and Olof Widlund and Jinchao Xu. Domain Decomposition Methods in Science and Engineering XX, Springer, pp.27-38, 2013, Lecture Notes in Computational Science and Engineering, 978-3-642-35274-4. ⟨10.1007/978-3-642-35275-1_3⟩
Chapitre d'ouvrage
istex
hal-00907070v1
|
|||
A New Approach for FCSRsSelected Areas in Cryptography - SAC 2009, Sep 2009, Calgary, Canada. pp.433-448
Communication dans un congrès
hal-00436558v1
|
|||
|
Cryptanalysis of RSA Signatures with Fixed-Pattern PaddingCRYPTO 2001, Aug 2001, Santa Barbara, United States. pp.433-439, ⟨10.1007/3-540-44647-8_25⟩
Communication dans un congrès
hal-02487054v1
|
||
Metal-insulator transition materials for bioinspired functions implementationLe premier colloque du GDR BioComp 4 au 8 octobre 2015 à Saint Paul de Vence, France, Oct 2015, Saint Paul de Vence, France
Poster de conférence
hal-01226172v1
|
|||
|
Heap . . . Hop! Heap Is Also VulnerableCardis 2014, Nov 2014, Paris, France. ⟨10.1007/978-3-319-16763-3_2⟩
Communication dans un congrès
hal-01250610v1
|
||
|
Serre's reduction of linear partial differential systems with holonomic adjoints[Research Report] RR-7486, INRIA. 2010, pp.36
Rapport
inria-00545658v2
|
||
|
On the isotopic meshing of an algebraic implicit surfaceJournal of Symbolic Computation, 2012, 47 (8), pp.903-925. ⟨10.1016/j.jsc.2011.09.010⟩
Article dans une revue
hal-00421214v1
|
||
Simulating Atmospheric Pollution Weathering on BuildingsInternational Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, Feb 2009, Pizen, Czech Republic. pp.65-72
Communication dans un congrès
hal-00475656v1
|
|||
Serre's reduction of linear partial differential systems with holonomic adjointsJournal of Symbolic Computation, 2012, 47 (10), pp.1192-1213. ⟨10.1016/j.jsc.2011.12.041⟩
Article dans une revue
istex
hal-00765942v1
|
|||
|
Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon CodesInternational Workshop on Coding and Cryptography - WCC 2013, Apr 2013, Bergen, Norway. pp.181-193
Communication dans un congrès
hal-00830594v1
|
||
|
Well-Posedness, Robustness, and Stability Analysis of a Set-Valued Controller for Lagrangian SystemsSIAM Journal on Control and Optimization, 2013, 51 (2), pp.1592-1614. ⟨10.1137/120872450⟩
Article dans une revue
hal-00825578v1
|
||
|
Semaine d'Etude Mathématiques et Entreprises 7 : Détection d'ilôtage dans un réseau électrique2013
Pré-publication, Document de travail
hal-00957592v1
|
||
|
Symbolic methods for developing new domain decomposition algorithms[Research Report] RR-7953, INRIA. 2012, pp.71
Rapport
hal-00694468v1
|
||
An algebraic analysis approach to certain classes of nonlinear systems of partial differential equations7th International Workshop on Multidimensional (nD) Systems (nDs), Sep 2011, Poitiers, France. pp.1-8, ⟨10.1109/nDS.2011.6076863⟩
Communication dans un congrès
hal-00682766v1
|
|||
|
Improving Integral Cryptanalysis against Rijndael with Large Blocks[Research Report] 2009
Rapport
inria-00423681v1
|
||
Construction of FCSR algebraic equations and empirical analysisSASC 2008 (the State of the Art of Stream Ciphers), Feb 2008, Lausanne, Switzerland
Communication dans un congrès
hal-00337044v1
|
|||
Using morphism computations for factoring and decomposing general linear functional systemsProceedings of Mathematical Theory of Networks and Systems, 2006, Kyoto, Japan. 74p
Communication dans un congrès
hal-00110555v1
|
|||
|
The Ising model: from elliptic curves to modular forms and Calabi-Yau equationsJournal of Physics A: Mathematical and Theoretical, 2011, 44 (4), pp.045204, 44. ⟨10.1088/1751-8113/44/4/045204⟩
Article dans une revue
hal-00684883v1
|
||
Module structure of classical multidimensional systems appearing in mathematical physicsProceedings of Mathematical Theory of Networks and Systems (MTNS) 2010, Jul 2010, Budapest, Hungary. pp.Inconnu
Communication dans un congrès
hal-00633261v1
|
|||
|
Memory Forensics of a Java Card DumpCardis 2014 - 13th International Conference Smart Card Research and Advanced Application Conference, CNAM, Nov 2014, Paris, France. pp.3-17, ⟨10.1007/978-3-319-16763-3_1⟩
Communication dans un congrès
hal-01250605v1
|
||
|
Calcul effectif de la topologie de courbes et surfaces algébriques réellesMathématiques [math]. Université de Limoges, 2009. Français. ⟨NNT : ⟩
Thèse
tel-00438817v1
|
||
|
Horizontal Correlation Analysis on Exponentiation[Research Report] 2010/394, IACR Cryptology ePrint Archive. 2010
Rapport
hal-02486982v1
|
||
|
Square Always Exponentiation12th International Conference on Cryptology in India - INDOCRYPT 2011, Dec 2011, Chennai, India. pp.40-57, ⟨10.1007/978-3-642-25578-6_5⟩
Communication dans un congrès
inria-00633545v1
|
||
On the security of FCSR-based pseudorandom generatorsSASC, the state of the Art of Stream Ciphers, Jan 2007, BOCHUM, Germany. pp.179-190
Communication dans un congrès
hal-00186643v1
|
|||
|
A new insight into Serre's reduction problem[Research Report] RR-8629, Inria Saclay; INRIA. 2014, pp.92
Rapport
hal-01083216v1
|
||
|
Symbolic preconditioning techniques for linear systems of partial differential equations2012
Pré-publication, Document de travail
hal-00664092v3
|
||
Symmetries, parametrizations and potentials of multidimensional linear systemsProceedings of Mathematical Theory of Networks and Systems (MTNS) 2010, Jul 2010, Budapest, Hungary. pp.Inconnu
Communication dans un congrès
hal-00633264v1
|