Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Abstract— This contribution analytically studies the influence of IQ mismatch on the performance of multiple-antenna orthogonal frequency division multiplexing (OFDM) systems ba...
Tim C. W. Schenk, Erik R. Fledderus, Peter F. M. S...
In this paper, we propose a novel occlusion invariant face recognition algorithm based on Selective Local Nonnegative Matrix Factorization (S-LNMF) technique. The proposed algorith...
Hyun Jun Oh, Kyoung Mu Lee, Sang Uk Lee, Chung-Hyu...
Abstract. Rigidity and reflectance are key object properties, important in their own rights, and they are key properties that stratify motion reconstruction algorithms. However, th...
Pollard's rho method is a randomized algorithm for computing discrete logarithms. It works by defining a pseudo-random sequence and then detecting a match in the sequence. Ma...