Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
This paper considers the optimisation of a nonlinear functional for image segmentation and noise reduction. Equations optimising this functional are derived and employed to detect...
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
One of the important issues in the design of future generation high-speed networks is to provide differentiated services to different types of applications with various time const...
The constellation design for differential space-time modulation usually requires to construct L (constellation size) unitary matrices making the design complexity increasing rapidl...