Indice
Letteratura scientifica selezionata sul tema "Fonctions de corrélation pseudo-aléatoires"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Fonctions de corrélation pseudo-aléatoires".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Fonctions de corrélation pseudo-aléatoires"
Ahrens, H. "Bass, J.: Fonctions de Corrélation, Fonctions Pseudo-Aléatoires et Applications. Masson, Paris 1984. 288 S., 190 F". Biometrical Journal 27, n. 7 (1985): 822. http://dx.doi.org/10.1002/bimj.4710270716.
Testo completoNuida, Koji. "Bounds of asymptotic occurrence rates of some patterns in binary words related to integer-valued logistic maps". Discrete Mathematics & Theoretical Computer Science DMTCS Proceedings vol. AK,..., Proceedings (1 gennaio 2009). http://dx.doi.org/10.46298/dmtcs.2696.
Testo completoTesi sul tema "Fonctions de corrélation pseudo-aléatoires"
Lenoble, Olivier. "Fonctions de corrélation de systèmes quantiques aléatoires". Aix-Marseille 2, 2003. http://www.theses.fr/2003AIX22044.
Testo completoRiahinia, Mahshid. "Constrained Pseudorandom Functions : New Constructions and Connections with Secure Computation". Electronic Thesis or Diss., Lyon, École normale supérieure, 2024. http://www.theses.fr/2024ENSL0022.
Testo completoPseudorandom functions (PRFs) were introduced in 1986 by Goldreich, Goldwasser, and Micali as efficient means of generating randomness and serve as essential tools in cryptography. These functions use a master secret key to map different inputs to pseudorandom outputs. Constrained pseudorandom functions (CPRFs), introduced in 2013, extend PRFs by additionally allowing the delegation of constrained keys that enable the evaluation of the function only on specific subsets of inputs. Notably, given a constrained key that evaluates the function on a subset of inputs, the output of a CPRF should remain pseudorandom on inputs outside of this subset. In this thesis, we establish links between CPRFs and two other cryptographic tools which were introduced in the context of secure computation: 1. We show how CPRFs can be constructed from homomorphic secret sharing (HSS) protocols. Homomorphic secret sharing protocols allow distributed computations over shares of a secret. We start by identifying two extensions of HSS protocols and show how they can be transformed into CPRFs generating constrained keys for subset of inputs that can be expressed via inner-product and NC1 predicates. Next, we observe that HSS protocols that already exist in the literature can be adapted to these new extensions. This leads to the discovery of five new CPRF constructions based on various standard hardness assumptions. 2.We show how CPRFs can be used to construct pseudorandom correlation functions (PCFs) for oblivious transfer (OT) correlations. PCFs for OT correlations enable two parties to generate OT-correlated pairs that can be used in fast secure computation protocols. Next, we instantiate our transformation by applying a slight modification to the well-known PRF construction of Naor and Reingold. We finally present a method for the non-interactive generation of evaluation keys for the latter instantiation which results in an efficient public-key PCF for OT correlations from standard assumptions
Hillali, Yassin El. "Etude et réalisation d'un système de communication et de localisation, basé sur les techniques d'étalement de spectre, dédié aux transports guidés". Valenciennes, 2005. http://ged.univ-valenciennes.fr/nuxeo/site/esupversions/bc65c6c9-a961-4f5e-88e5-cac7be0268f3.
Testo completoThe aim of this work is to design a localization and communication system dedicated to guided automatic trains in order to enhance their exploitation and to increase their reliability. The principal function of this radar is to reduce the lost exploitation time caused by a broken-down train to allow the following train to estimate in real time the distance between them. The sensor is a cooperative radar composed by two couples of interrogators– transponders which equip the front and the rear of each train following a complete loop. The choice of the sensor type is directed towards the correlation radar, because it maximizes the output signal to noise ratio. Some original multiplexing techniques based on spreading spectrum have been developed to combine the localization and the communication functions inside the same device. This system must be able to work on open area and also in tunnel. The choice of Hyperfrequency front-ends has been done following this important characteristic. The whole system (Transmitter/Receiver) have been simulated in real conditions in order to validate the selected technical choices. Finally, we present some solutions to implement the computing algorithms on a FPGA devices. A mock-up has been realized and the first tests have been carried out on open area. The obtained results show that a range of about 700m could be reached. The proposed multiplexing techniques allow the system to establish a communication with different data rates among (97kb/s, 1. 6Mb/S, 5. 4Mb/s and 11. 27Mb/s)
Boursier, Guesdon Carine. "Corrélation de suites construites a partir de caractères multiplicatifs". Toulon, 1999. http://www.theses.fr/1999TOUL0013.
Testo completoNowadays, communication systems are based on numerical transmissions, in wich a source delivers messages to recipients. The merits of the transmission depend on correlation of signals and on the choice of a family of sequences with good autocorrelation properties (to allow synchronization) and good crosscorrelation properties no allow several users a simultaneous access to a common channel). Exhaustive studies are impossible for high lengths, so a lot of theoretical studies have been performed to find good families. Unfortunately, there are a lot of lengths for which no known sequences exist. The goal of this work is rims to enlarge the choice of lengths which can be used. The first part of this document is dedicated to new design of sequences by associating trace and multiplicative characters. Tins leads to interesting properties, new in regard to prior research. The second part is devoted to the study of the crosscorrelation of the former sequences. We give some elements of a complete answer and conclude by a numerical study, selecting families by a maximal clique problem algorithm. In the last part of this work- we modify some existing sequences or families. Two constructions are proposed ; interleaving and multiplication by an additive character
Stojanovic, Alexandre. "Sur la distribution limite des valeurs propres dans des matrices aléatoires". Paris 7, 2003. http://www.theses.fr/2003PA077184.
Testo completoEtourneau, Thomas. "Les forêts Lyman alpha du relevé eBOSS : comprendre les fonctions de corrélation et les systématiques". Thesis, université Paris-Saclay, 2020. http://www.theses.fr/2020UPASP029.
Testo completoThis PhD thesis is part of eBOSS and DESI projects. These projects, among other tracers, use the Lyman-α (Lyα) absorption to probe the matter distribution in the universe and measure thebaryon acoustic oscillations (BAO) scale. The measurement of the BAO scale to the sound horizon ratio allows to constrain the universe expansion and so the ΛCDM model, the standard model of cosmology. This thesis presents the development of mock data sets used in order to check the BAO analyses carried out by the Lyα group within the eBOSS and DESI collaborations. These mocks make use of gaussian random fields (GRF). GRF allow to generate a density field δ. From this density field, quasar (QSO) positions are drawn. From each quasar, a line of sight is constructed. Then, the density field δ is interpolated along each line of sight. Finally, the fluctuating Gunn Peterson approximation (FGPA) is used to convert the interpolated density into the optical depth τ , and then into the Lyα absorption. Thanks to a program developed by the DESI community, a continuum is added to each Lyα forest in order to produce quasar synthetic spectra. The mocks presented in the manuscript provide a survey of quasars whose Lyα forests in the quasar spectra have the correct Lyα×Lyα auto-correlation, Lyα×QSO cross-correlation, as well as the correct QSO×QSO and HCD×HCD (High Column Density systems) auto-correlation functions. The study of these mocks shows that the BAO analysis run on the whole Lyα eBOSS data set produces a non-biaised measurement of the BAO parameters αk et α⊥. In addition, the analysis of the model used to fit the correlation functions shows that the shape of the Lyα×Lyα auto-correlation, which is linked to the bias bLyα and redshift space distorsions (RSD) parameter βLyα, are understood up to 80 %. The systematics affecting the measurement of the Lyα parameters (bLyα et βLyα) come from two different effects. The first one originates from thedistortion matrix which does not capture all the distortions produced by the quasar continuum fittingprocedure. The second one is linked to the HCD modelling. The modelling of these strong absorbers is not perfect and affects the measurement of the Lyα parameters, especially the RSD parameter βLyα. Thus, the analysis of these mocks allows to validate the systematic control of the BAO analyses done with the Lyα. However, a better understanding of the measurement of the Lyα parameters is required in order to consider using the Lyα, which means combining the Lyα×Lyα autocorrelation and Lyα×QSO cross-correlation, to do a RSD analysis
Oon, Shea Ming. "Construction des suites binaires pseudo-aléatoires". Nancy 1, 2005. http://docnum.univ-lorraine.fr/public/SCD_T_2005_0017_OON.pdf.
Testo completoThis thesis presents some constructions of pseudo-random sequences inspired by natural questions in number theory. We use two measures introduced by A. Sárközy et C. Mauduit to discuss some aspects of a priori testing of these sequences. They are the well-distribution measure and correlation measure of order k. On the one hand, thanks to a work of A. Weil, some Dirichlet characters give a large family of interesting examples of constructions. On the other hand, our study on a construction based on the distribution of the greatest prime factors do not supply any sufficiently exploitable estimate. However, we observe the bias on some congruence classes of prime factors. We also discuss some probability aspects of both measures. A brief history on the randomness is presented to help better comprehension, as well as some subjects in cryptology which are given in an appendix
El, Khaldi Baroudi. "Imagerie et détection ultrasonores par corrélation". Valenciennes, 2003. http://ged.univ-valenciennes.fr/nuxeo/site/esupversions/7fed2914-be6c-4d4a-960c-ea85f433a0ad.
Testo completoIn classical ultrasonic echography, the extraction of signatures from echoes is performed using deconvolution processes in time and frequency domains. The detection based on correlation resorts to continuous or coded signals. Discrete signals give good dynamic and limit ghosts. The resolution is jointly improved using pseudorandom binary sequences. The study of one bit and multibits correlators is given for isolated or multiple targets. The influences of averaging, oversampling, quantization and system response bandwith are evidenced. An architecture based on software approach and storage of signals give access to digital post-processing techniques. Several experiments are reported which highlight the performances and advantages of correlation detection
Béraud, Robert. "Améliorations de semis pseudo-aléatoires par des méthodes géométriques locales". Aix-Marseille 2, 1986. http://www.theses.fr/1986AIX22041.
Testo completoMontreuil, Audrey. "Mariage et papillons : calcul multi-parties et schéma de Benes revisité". Versailles-St Quentin en Yvelines, 2006. http://www.theses.fr/2006VERS0045.
Testo completoThis thesis consists of two sections. Ln the first section, we study a particular case of a multiparty computation: the Marriage ProposaI' s Problem, or more formally the fair computation of the logical AND. We give an efficient protocol b modifying the solution of the Socialist Millionaires' Problem (equality between two integers) from Boudot, Schoenmaker and Traoré. We ex tend our protocol to the case of n players and to other Boolean functions. Ln the second section, we ar interested with the Benes scheme (composition of two schemes called "Butterfly") which gives, from random functions 0 n bits to n bits, a pseudo-random function of Zn bits to Zn bits. We have noticed that the proof of security given in th initial paper of Aiello and Venkatesan is not valid for aIl chosen plaintext attacks. We provide a detailed proof of security against adaptive chosen plaintext attacks when m«Z-(n(l-e», for aIl e>O, where m is the number of chosen messages