RFID security is currently one of the major challenges cryptography has to face, often solved by protocols assuming that an on-tag hash function is available. In this article we pr...
This report develops and studies a new family of NSE-regularizations, Tikhonov Leray Regularization with Time Relaxation Models. This new family of turbulence models is based on a...
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
: Locality Sensitive Hash functions are invaluable tools for approximate near neighbor problems in high dimensional spaces. In this work, we are focused on LSH schemes where the si...
We propose a copula based statistical method of fitting joint cumulative returns between a market index and a stock from the index family to daily data. Modifying the method of in...