Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
We consider regularized stochastic learning and online optimization problems, where the objective function is the sum of two convex terms: one is the loss function of the learning...
An exact and general expression for the analytic wavelet transform of a real-valued signal is constructed, resolving the time-dependent effects of non-negligible amplitude and fre...
In this paper, we study multi-hop non-regenerative multiple-input multiple-output (MIMO) relay communications with any number of hops. We design the optimal source precoding matrix...
This paper is devoted to the blind separation of convolutive mixtures of possibly non circular linearly modulated signals with unknown (and possibly different) baud rates and carr...