×

Found 54 Documents (Results 1–54)

Decarbonizing the European energy system in the absence of Russian gas: Hydrogen uptake and carbon capture developments in the power, heat and industry sectors. arXiv:2308.08953

Preprint, arXiv:2308.08953 [econ.GN] (2023).
BibTeX Cite
Full Text: arXiv

Integrated investment, retrofit and abandonment planning of energy systems with short-term and long-term uncertainty using enhanced Benders decomposition. arXiv:2303.09927

Preprint, arXiv:2303.09927 [math.OC] (2023).
BibTeX Cite
Full Text: arXiv

Viewing rate-based neurons as biophysical conductance outputting models. (English) Zbl 1525.68115

McQuillan, Ian (ed.) et al., Unconventional computation and natural computation. 18th international conference, UCNC 2019, Tokyo, Japan, June 3–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11493, 164-177 (2019).
MSC:  68T05 92B20 92C20
PDFBibTeX XMLCite
Full Text: DOI Link

Longest common extensions in sublinear space. (English) Zbl 1380.68139

Cicalese, Ferdinando (ed.) et al., Combinatorial pattern matching. 26th annual symposium, CPM 2015, Ischia Island, Italy, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19928-3/pbk; 978-3-319-19929-0/ebook). Lecture Notes in Computer Science 9133, 65-76 (2015).
MSC:  68P05 68Q25
PDFBibTeX XMLCite
Full Text: DOI arXiv

PRINCE – a low-latency block cipher for pervasive computing applications. Extended abstract. (English) Zbl 1292.94035

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 208-225 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract). (English) Zbl 1290.94044

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 45-62 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of PRESENT-like ciphers with secret S-boxes. (English) Zbl 1307.94038

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 270-289 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved security analysis of Fugue-256 (poster). (English) Zbl 1295.94070

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 428-432 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

PRINTcipher: a block cipher for IC-printing. (English) Zbl 1297.94080

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 16-32 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Practical pseudo-collisions for hash functions ARIRANG-224/384. (English) Zbl 1267.94063

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 141-156 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of C2. (English) Zbl 1184.94226

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 250-266 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On randomizing hash functions to strengthen the security of digital signatures. (English) Zbl 1239.94072

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 88-105 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Adaptive soft-decision iterative decoding using edge local complementation. (English) Zbl 1166.94358

Barbero, Ángela (ed.), Coding theory and applications. Second international castle meeting, ICMCTA 2008, Castillo de La Mota, Medina del Campo, Spain, September 15–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-87447-8/pbk). Lecture Notes in Computer Science 5228, 82-94 (2008).
MSC:  94B35
PDFBibTeX XMLCite
Full Text: DOI arXiv

PRESENT: An ultra-lightweight block cipher. (English) Zbl 1142.94334

Paillier, Pascal (ed.) et al., Cryptographic hardware and embedded systems – CHES 2007. 9th international workshop, Vienna, Austria, September 10–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74734-5/pbk). Lecture Notes in Computer Science 4727, 450-466 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Discrete tomography for generating grain maps of polycrystals. (English) Zbl 1180.82190

Herman, Gabor T. (ed.) et al., Advances in discrete tomography and its applications. Some papers based on the presentations at the workshop on discrete tomography and its applications, New York, NY, USA, June 13–15, 2005. Boston, MA: Birkhäuser (ISBN 978-0-8176-3614-2/hbk). Applied and Numerical Harmonic Analysis, 271-301 (2007).
MSC:  82D25 68U10 94A08
PDFBibTeX XMLCite

Discrete tomographic reconstruction of 2D polycrystal orientation maps from X-ray diffraction projections using Gibbs priors. (English) Zbl 1138.82364

Herman, Gabor T. (ed.) et al., Proceedings of the workshop on discrete tomography and its applictions, New York, NY, USA, June 13–15, 2005. Amsterdam: Elsevier. Electronic Notes in Discrete Mathematics 20, 439-453 (2005).
MSC:  82D25 68U10 94A08
PDFBibTeX XMLCite
Full Text: DOI

Resolving ambiguities in reconstructed grain maps using discrete tomography. (English) Zbl 1121.68117

Herman, Gabor T. (ed.) et al., Proceedings of the workshop on discrete tomography and its applications, New York, NY, USA, June 13–15, 2005. Amsterdam: Elsevier. Electronic Notes in Discrete Mathematics 20, 419-437 (2005).
MSC:  68U10 65C05
PDFBibTeX XMLCite
Full Text: DOI

Fault attacks on signature schemes. (English) Zbl 1098.94613

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 478-491 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Neutral interfaces in design, simulation, and programming for robotics. (English) Zbl 0809.68035

Research Reports ESPRIT. Subseries PDT (Product Data Technology). Project 5109: Neutral interfaces for robotics (NIRO). Berlin: Springer-Verlag. xv, 334 p. DM 70.00; öS 546.00; sFr 70.00 /sc (1994).
MSC:  68-02 68T35 68U20 68U07
PDFBibTeX XMLCite

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software