Skip to main content

Showing 1–42 of 42 results for author: Naccache, D

.
  1. arXiv:2308.10704  [pdf, other

    cs.LG cs.AI cs.CV

    Sampling From Autoencoders' Latent Space via Quantization And Probability Mass Function Concepts

    Authors: Aymene Mohammed Bouayed, Adrian Iaccovelli, David Naccache

    Abstract: In this study, we focus on sampling from the latent space of generative models built upon autoencoders so as the reconstructed samples are lifelike images. To do to, we introduce a novel post-training sampling algorithm rooted in the concept of probability mass functions, coupled with a quantization process. Our proposed algorithm establishes a vicinity around each latent vector from the input dat… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

  2. arXiv:2308.06291  [pdf

    math.NT

    The Balkans Continued Fraction

    Authors: David Naccache, Ofer Yifrach-Stav

    Abstract: In a previous escapade we gave a collection of continued fractions involving Catalan's constant. This paper provides more general formulae governing those continued fractions. Having distinguished different cases associated to regions in the plan, we nickname those continued fractions \enquote{The Balkans} as they divide into areas which are related but still different in nature. Because we do n… ▽ More

    Submitted 18 April, 2024; v1 submitted 10 August, 2023; originally announced August 2023.

  3. arXiv:2301.06489  [pdf, ps, other

    cs.LG cs.AI cs.CV

    Simplex Autoencoders

    Authors: Aymene Mohammed Bouayed, David Naccache

    Abstract: Synthetic data generation is increasingly important due to privacy concerns. While Autoencoder-based approaches have been widely used for this purpose, sampling from their latent spaces can be challenging. Mixture models are currently the most efficient way to sample from these spaces. In this work, we propose a new approach that models the latent space of an Autoencoder as a simplex, allowing for… ▽ More

    Submitted 16 January, 2023; originally announced January 2023.

  4. arXiv:2301.01624  [pdf, ps, other

    math.NT cs.LG

    Pattern Recognition Experiments on Mathematical Expressions

    Authors: David Naccache, Ofer Yifrach-Stav

    Abstract: We provide the results of pattern recognition experiments on mathematical expressions. We give a few examples of conjectured results. None of which was thoroughly checked for novelty. We did not attempt to prove all the relations found and focused on their generation.

    Submitted 21 December, 2022; originally announced January 2023.

  5. arXiv:2211.01058  [pdf, ps, other

    math.NT cs.SC

    A Note on the Ramanujan Machine

    Authors: Eric Brier, David Naccache, Ofer Yifrach-Stav

    Abstract: The Ramanujan Machine project detects new expressions related to constants of interest, such as $ζ$ function values, $γ$ and algebraic numbers (to name a few). In particular the project lists a number of conjectures involving even and odd $ζ$ function values, logarithms etc. We show that many relations detected by the Ramanujan Machine Project stem from a specific algebraic observation and show ho… ▽ More

    Submitted 3 November, 2022; v1 submitted 2 November, 2022; originally announced November 2022.

  6. arXiv:2210.15669  [pdf, ps, other

    cs.SC cs.DM math.NT

    On Catalan Constant Continued Fractions

    Authors: David Naccache, Ofer Yifrach-Stav

    Abstract: The Ramanujan Machine project detects new expressions related to constants of interest, such as $ζ$ function values, $γ$ and algebraic numbers (to name a few). In particular the project lists a number of conjectures concerning the Catalan constant $G= 0.91596559\ldots$ We show how to generate infinitely many. We used an ad hoc software toolchain and rather tedious mathematical developments. Becaus… ▽ More

    Submitted 18 November, 2022; v1 submitted 30 October, 2022; originally announced October 2022.

  7. A forensic analysis of the Google Home: repairing compressed data without error correction

    Authors: Hadrien Barral, Georges-Axel Jaloyan, Fabien Thomas-Brans, Matthieu Regnery, Rémi Géraud-Stewart, Thibaut Heckmann, Thomas Souvignet, David Naccache

    Abstract: This paper provides a detailed explanation of the steps taken to extract and repair a Google Home's internal data. Starting with reverse engineering the hardware of a commercial off-the-shelf Google Home, internal data is then extracted by desoldering and dum** the flash memory. As error correction is performed by the CPU using an undisclosed method, a new alternative method is shown to repair a… ▽ More

    Submitted 29 September, 2022; originally announced October 2022.

    Comments: 28 pages, modified version of paper that appeared originally at Forensic Science International: Digital Investigation

    Journal ref: Forensic Science International: Digital Investigation, Volume 42, 2022, 301437, ISSN 2666-2817

  8. arXiv:2206.03604  [pdf, other

    math.NT

    Automated Discovery of New $L$-Function Relations

    Authors: Hadrien Barral, Rémi Géraud-Stewart, Arthur Léonard, David Naccache, Quentin Vermande, Samuel Vivien

    Abstract: $L… ▽ More

    Submitted 9 June, 2022; v1 submitted 7 June, 2022; originally announced June 2022.

  9. arXiv:2205.14236  [pdf, other

    cs.LG

    FedControl: When Control Theory Meets Federated Learning

    Authors: Adnan Ben Mansour, Gaia Carenini, Alexandre Duplessis, David Naccache

    Abstract: To date, the most popular federated learning algorithms use coordinate-wise averaging of the model parameters. We depart from this approach by differentiating client contributions according to the performance of local learning and its evolution. The technique is inspired from control theory and its classification performance is evaluated extensively in IID framework and compared with FedAvg.

    Submitted 27 May, 2022; originally announced May 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2205.10864

  10. arXiv:2205.10864  [pdf, other

    stat.ML cs.LG

    Federated Learning Aggregation: New Robust Algorithms with Guarantees

    Authors: Adnan Ben Mansour, Gaia Carenini, Alexandre Duplessis, David Naccache

    Abstract: Federated Learning has been recently proposed for distributed model training at the edge. The principle of this approach is to aggregate models learned on distributed clients to obtain a new more general "average" model (FedAvg). The resulting model is then redistributed to clients for further training. To date, the most popular federated learning algorithm uses coordinate-wise averaging of the mo… ▽ More

    Submitted 18 July, 2022; v1 submitted 22 May, 2022; originally announced May 2022.

  11. arXiv:2110.11079  [pdf, other

    cs.IR

    Tagged Documents Co-Clustering

    Authors: Gaëlle Candel, David Naccache

    Abstract: Tags are short sequences of words allowing to describe textual and non-texual resources such as as music, image or book. Tags could be used by machine information retrieval systems to access quickly a document. These tags can be used to build recommender systems to suggest similar items to a user. However, the number of tags per document is limited, and often distributed according to a Zipf law. I… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

    Comments: 15 pages, submitted and accepted to the 2021 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'21) - track ICAI21

    MSC Class: 68T99 ACM Class: I.2.m

  12. arXiv:2110.09212  [pdf, other

    cs.LG cs.AI

    Noise-Resilient Ensemble Learning using Evidence Accumulation Clustering

    Authors: Gaëlle Candel, David Naccache

    Abstract: Ensemble Learning methods combine multiple algorithms performing the same task to build a group with superior quality. These systems are well adapted to the distributed setup, where each peer or machine of the network hosts one algorithm and communicate its results to its peers. Ensemble learning methods are naturally resilient to the absence of several peers thanks to the ensemble redundancy. How… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

    Comments: 12 pages, submitted and accepted to ANTIC-2021 (International Conference on Advanced Network Technologies and Intelligent Computing)

    MSC Class: 68T99 ACM Class: I.2.m

  13. arXiv:2110.04263  [pdf, ps, other

    math.NT

    The Multiplicative Persistence Conjecture Is True for Odd Targets

    Authors: Eric Brier, Christophe Clavier, Linda Gutsche, David Naccache

    Abstract: In 1973, Neil Sloane published a very short paper introducing an intriguing problem: Pick a decimal integer $n$ and multiply all its digits by each other. Repeat the process until a single digit $Δ(n)$ is obtained. $Δ(n)$ is called the \textsl{multiplicative digital root of $n$} or \textsl{the target of $n$}. The number of steps $Ξ(n)$ needed to reach $Δ(n)$, called the multiplicative persistence… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

  14. arXiv:2109.14925  [pdf, other

    cs.LG

    Genealogical Population-Based Training for Hyperparameter Optimization

    Authors: Antoine Scardigli, Paul Fournier, Matteo Vilucchio, David Naccache

    Abstract: HyperParameter Optimization (HPO) aims at finding the best HyperParameters (HPs) of learning models, such as neural networks, in the fastest and most efficient way possible. Most recent HPO algorithms try to optimize HPs regardless of the model that obtained them, assuming that for different models, same HPs will produce very similar results. We break free from this paradigm and propose a new take… ▽ More

    Submitted 9 April, 2023; v1 submitted 30 September, 2021; originally announced September 2021.

  15. arXiv:2109.10538  [pdf, other

    cs.LG cs.AI

    Index $t$-SNE: Tracking Dynamics of High-Dimensional Datasets with Coherent Embeddings

    Authors: Gaëlle Candel, David Naccache

    Abstract: $t$-SNE is an embedding method that the data science community has widely Two interesting characteristics of t-SNE are the structure preservation property and the answer to the crowding problem, where all neighbors in high dimensional space cannot be represented correctly in low dimensional space. $t… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

    Comments: International Conference on Big Data Visual Analytics (ICBDVA), Venice, Italy, August 12-13 2021 https://publications.waset.org/pdf/10012177 Best paper award

    MSC Class: 90-08 ACM Class: I.m; J.m

    Journal ref: International Journal of Computer and Systems Engineering (2021), 15(8), 500 - 512

  16. arXiv:2109.10007  [pdf, other

    cs.DL cs.AI

    Generating Local Maps of Science using Deep Bibliographic Coupling

    Authors: Gaëlle Candel, David Naccache

    Abstract: Bibliographic and co-citation coupling are two analytical methods widely used to measure the degree of similarity between scientific papers. These approaches are intuitive, easy to put into practice, and computationally cheap. Moreover, they have been used to generate a map of science, allowing visualizing research field interactions. Nonetheless, these methods do not work unless two papers share… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

    Comments: Submitted to the International Conference on Scientometrics and Informetrics. Accepted as a poster. Here, long version

    MSC Class: 01A85 ACM Class: H.5; I.m; J.m

    Journal ref: July 12-15, 2021 18th International Conference of the International Society for Scientometrics and Informetrics Leuven, Belgium

  17. arXiv:2109.07135  [pdf, other

    cs.IR cs.AI

    Co-Embedding: Discovering Communities on Bipartite Graphs through Projection

    Authors: Gaëlle Candel, David Naccache

    Abstract: Many datasets take the form of a bipartite graph where two types of nodes are connected by relationships, like the movies watched by a user or the tags associated with a file. The partitioning of the bipartite graph could be used to fasten recommender systems, or reduce the information retrieval system's index size, by identifying groups of items with similar properties. This type of graph is ofte… ▽ More

    Submitted 30 September, 2021; v1 submitted 15 September, 2021; originally announced September 2021.

    Comments: Submitted and accepted to FICC 2022 (Future of Information and Communication Conference). Long version

    MSC Class: 68T99 ACM Class: I.2.6

  18. arXiv:2106.10971  [pdf, ps, other

    cs.IT cs.DS

    Near-Optimal Pool Testing under Urgency Constraints

    Authors: Éric Brier, Megi Dervishi, Rémi Géraud-Stewart, David Naccache, Ofer Yifrach-Stav

    Abstract: Detection of rare traits or diseases in a large population is challenging. Pool testing allows covering larger swathes of population at a reduced cost, while simplifying logistics. However, testing precision decreases as it becomes unclear which member of a pool made the global test positive. In this paper we discuss testing strategies that provably approach best-possible strategy - optimal in t… ▽ More

    Submitted 21 June, 2021; originally announced June 2021.

  19. Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis

    Authors: Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache

    Abstract: Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core, high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted security mechanisms have become commonplace for protecting device data, such as trusted execution environments, full-disk and file-based encryption. Both advancements have dramatically complicated the use of conventional physical… ▽ More

    Submitted 22 March, 2022; v1 submitted 10 May, 2021; originally announced May 2021.

    Journal ref: Computers & Security. 111 (2021) 102471

  20. arXiv:2104.09982  [pdf, other

    cs.CG cs.DM cs.DS math.CO

    Explaining the Entombed Algorithm

    Authors: Leon Mächler, David Naccache

    Abstract: In \cite{entombed}, John Aycock and Tara Copplestone pose an open question, namely the explanation of the mysterious lookup table used in the Entombed Game's Algorithm for two dimensional maze generation. The question attracted media attention (BBC etc) and was open until today. This paper answers this question, explains the algorithm and even extends it to three dimensions.

    Submitted 21 April, 2021; v1 submitted 18 April, 2021; originally announced April 2021.

  21. arXiv:2103.09031  [pdf

    cs.AI

    Evaluation of a Bi-Directional Methodology for Automated Assessment of Compliance to Continuous Application of Clinical Guidelines, in the Type 2 Diabetes-Management Domain

    Authors: Avner Hatsek, Irit Hochberg, Deeb Daoud Naccache, Aya Biderman, Yuval Shahar

    Abstract: We evaluated the DiscovErr system, in which we had previously implemented a new methodology for assessment of compliance to continuous application of evidence-based clinical guidelines, based on a bidirectional search from the guideline objectives to the patient's longitudinal data, and vice versa. We compared the system comments on 1584 transactions regarding the management, over a mean of 5.23 y… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

    Comments: 25 pages; 4 figures, 6 tables

    ACM Class: I.2.1

  22. Return-Oriented Programming on RISC-V

    Authors: Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache

    Abstract: This paper provides the first analysis on the feasibility of Return-Oriented Programming (ROP) on RISC-V, a new instruction set architecture targeting embedded systems. We show the existence of a new class of gadgets, using several Linear Code Sequences And Jumps (LCSAJ), undetected by current Galileo-based ROP gadget searching tools. We argue that this class of gadgets is rich enough on RISC-V to… ▽ More

    Submitted 15 March, 2021; originally announced March 2021.

    Comments: 27 pages, 8 figures, originally published at AsiaCCS 2020

  23. arXiv:2102.01995  [pdf, ps, other

    cs.MA

    Convergence Voting: From Pairwise Comparisons to Consensus

    Authors: Gergei Bana, Wojciech Jamroga, David Naccache, Peter Y. A. Ryan

    Abstract: An important aspect of AI design and ethics is to create systems that reflect aggregate preferences of the society. To this end, the techniques of social choice theory are often utilized. We propose a new social choice function motivated by the PageRank algorithm. The function ranks voting options based on the Condorcet graph of pairwise comparisons. To this end, we transform the Condorcet graph i… ▽ More

    Submitted 1 March, 2021; v1 submitted 3 February, 2021; originally announced February 2021.

  24. arXiv:2007.09085  [pdf, other

    cs.CR q-bio.QM

    Preservation of DNA Privacy During the Large Scale Detection of COVID-19

    Authors: Marcel Hollenstein, David Naccache, Peter B. Rønne, Peter Y A Ryan, Robert Weil, Ofer Yifrach-Stav

    Abstract: As humanity struggles to contain the global COVID-19 pandemic, privacy concerns are emerging regarding confinement, tracing and testing. The scientific debate concerning privacy of the COVID-19 tracing efforts has been intense, especially focusing on the choice between centralised and decentralised tracing apps. The privacy concerns regarding COVID-19 testing, however, have not received as much at… ▽ More

    Submitted 1 August, 2020; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: 10 pages, 1 figure

  25. arXiv:2006.11634  [pdf, other

    math.DS cs.FL

    A Fractional $3n+1$ Conjecture

    Authors: Éric Brier, Rémi Géraud-Stewart, David Naccache

    Abstract: In this paper we introduce and discuss the sequence of \emph{real numbers} defined as $u_0 \in \mathbb R$ and $u_{n+1} = Δ(u_n)$ where \begin{equation*} Δ(x) = \begin{cases} \frac{x}{2} &\text{if } \operatorname{frac}(x)<\frac{1}{2} \\[4px] \frac{3x+1}{2} & \text{if } \operatorname{frac}(x)\geq\frac{1}{2} \end{cases} \end{equation*} This sequence is reminiscent of the famous Collatz sequence, and… ▽ More

    Submitted 20 June, 2020; originally announced June 2020.

  26. arXiv:2006.07246  [pdf, ps, other

    math.DS cs.FL math.CO

    The Look-and-Say The Biggest Sequence Eventually Cycles

    Authors: Éric Brier, Rémi Géraud-Stewart, David Naccache, Alessandro Pacco, Emanuele Troiani

    Abstract: In this paper we consider a variant of Conway's sequence (OEIS A005150, A006715) defined as follows: the next term in the sequence is obtained by considering contiguous runs of digits, and rewriting them as $ab$ where $b$ is the digit and $a$ is the maximum of $b$ and the run's length. We dub this the "look-and-say the biggest" (LSB) sequence. Conway's sequence is very similar ($b$ is just the run… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

  27. arXiv:2006.06837  [pdf, ps, other

    math.DS cs.FL math.CO

    Stuttering Conway Sequences Are Still Conway Sequences

    Authors: Éric Brier, Rémi Géraud-Stewart, David Naccache, Alessandro Pacco, Emanuele Troiani

    Abstract: A look-and-say sequence is obtained iteratively by reading off the digits of the current value, grou** identical digits together: starting with 1, the sequence reads: 1, 11, 21, 1211, 111221, 312211, etc. (OEIS A005150). Starting with any digit $d \neq 1$ gives Conway's sequence: $d$, $1d$, $111d$, $311d$, $13211d$, etc. (OEIS A006715). Conway popularised these sequences and studied some of thei… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  28. arXiv:2006.02353  [pdf, ps, other

    cs.GT

    At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate Tic-Tac-Toe

    Authors: Guillaume Bertholon, Rémi Géraud-Stewart, Axel Kugelmann, Théo Lenoir, David Naccache

    Abstract: Ultimate Tic-Tac-Toe is a variant of the well known tic-tac-toe (noughts and crosses) board game. Two players compete to win three aligned "fields", each of them being a tic-tac-toe game. Each move determines which field the next player must play in. We show that there exist a winning strategy for the first player, and therefore that there exist an optimal winning strategy taking at most 43 move… ▽ More

    Submitted 6 June, 2020; v1 submitted 3 June, 2020; originally announced June 2020.

  29. Keyed Non-Parametric Hypothesis Tests

    Authors: Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache

    Abstract: The recent popularity of machine learning calls for a deeper understanding of AI security. Amongst the numerous AI threats published so far, poisoning attacks currently attract considerable attention. In a poisoning attack the opponent partially tampers the dataset used for learning to mislead the classifier during the testing phase. This paper proposes a new protection strategy against poisonin… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: Paper published in NSS 2019

  30. arXiv:2005.04740  [pdf, ps, other

    cs.DS

    Approaching Optimal Duplicate Detection in a Sliding Window

    Authors: Rémi Géraud-Stewart, Marius Lombard-Platet, David Naccache

    Abstract: Duplicate detection is the problem of identifying whether a given item has previously appeared in a (possibly infinite) stream of data, when only a limited amount of memory is available. Unfortunately the infinite stream setting is ill-posed, and error rates of duplicate detection filters turn out to be heavily constrained: consequently they appear to provide no advantage, asymptotically, over a… ▽ More

    Submitted 10 May, 2020; originally announced May 2020.

  31. arXiv:2005.02940  [pdf, other

    cs.AI cs.DM q-bio.QM

    Optimal Covid-19 Pool Testing with a priori Information

    Authors: Marc Beunardeau, Éric Brier, Noémie Cartier, Aisling Connolly, Nathanaël Courant, Rémi Géraud-Stewart, David Naccache, Ofer Yifrach-Stav

    Abstract: As humanity struggles to contain the global Covid-19 infection, prophylactic actions are grandly slowed down by the shortage of testing kits. Governments have taken several measures to work around this shortage: the FDA has become more liberal on the approval of Covid-19 tests in the US. In the UK emergency measures allowed to increase the daily number of locally produced test kits to 100,000. Chi… ▽ More

    Submitted 11 May, 2020; v1 submitted 6 May, 2020; originally announced May 2020.

  32. arXiv:1908.03819  [pdf, other

    cs.CR

    RISC-V: #AlphanumericShellcoding

    Authors: Hadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan, David Naccache

    Abstract: We explain how to design RISC-V shellcodes capable of running arbitrary code, whose ASCII binary representation use only letters a-zA-Z, digits 0-9, and either of the three characters: #, /, '.

    Submitted 10 August, 2019; originally announced August 2019.

    Comments: 25 pages, originally published at WOOT'19

  33. Quotient Hash Tables - Efficiently Detecting Duplicates in Streaming Data

    Authors: Rémi Géraud, Marius Lombard-Platet, David Naccache

    Abstract: This article presents the Quotient Hash Table (QHT) a new data structure for duplicate detection in unbounded streams. QHTs stem from a corrected analysis of streaming quotient filters (SQFs), resulting in a 33\% reduction in memory usage for equal performance. We provide a new and thorough analysis of both algorithms, with results of interest to other existing constructions. We also introduce a… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

    Comments: Shorter version was accepted at SIGAPP SAC '19

  34. arXiv:1709.08357  [pdf, ps, other

    cs.CR

    Generating Functionally Equivalent Programs Having Non-Isomorphic Control-Flow Graphs

    Authors: Rémi Géraud, Mirko Koscina, Paul Lenczner, David Naccache, David Saulpic

    Abstract: One of the big challenges in program obfuscation consists in modifying not only the program's straight-line code (SLC) but also the program's control flow graph (CFG). Indeed, if only SLC is modified, the program's CFG can be extracted and analyzed. Usually, the CFG leaks a considerable amount of information on the program's structure. In this work we propose a method allowing to re-write a code… ▽ More

    Submitted 25 September, 2017; originally announced September 2017.

    Comments: 16 pages paper, published in NordSec 2017 (conference), Proceedings of the Nordic Conference on Secure IT Systems (Nordic 2017)

  35. arXiv:1608.03415  [pdf, other

    cs.CR

    ARMv8 Shellcodes from 'A' to 'Z'

    Authors: Hadrien Barral, Houda Ferradi, Rémi Géraud, Georges-Axel Jaloyan, David Naccache

    Abstract: We describe a methodology to automatically turn arbitrary ARMv8 programs into alphanumeric executable polymorphic shellcodes. Shellcodes generated in this way can evade detection and bypass filters, broadening the attack surface of ARM-powered devices such as smartphones.

    Submitted 22 June, 2019; v1 submitted 11 August, 2016; originally announced August 2016.

    Comments: 28 pages, 2 figures, source code in ARMv8, haskell, php, M4

  36. Flexible Attribute-Based Encryption Applicable to Secure E-Healthcare Records

    Authors: Bo Qin, Hua Deng, Qianhong Wu, Josep Domingo-Ferrer, David Naccache, Yunya Zhou

    Abstract: In e-healthcare record systems (EHRS), attribute-based encryption (ABE) appears as a natural way to achieve fine-grained access control on health records. Some proposals exploit key-policy ABE (KP-ABE) to protect privacy in such a way that all users are associated with specific access policies and only the ciphertexts matching the users' access policies can be decrypted. An issue with KP-ABE is th… ▽ More

    Submitted 21 December, 2015; originally announced December 2015.

    Journal ref: International Journal of Information Security, Vol. 14, no. 6, pp. 499-511, 2015

  37. arXiv:1509.00378  [pdf, ps, other

    cs.IT

    A Number-Theoretic Error-Correcting Code

    Authors: Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache

    Abstract: In this paper we describe a new error-correcting code (ECC) inspired by the Naccache-Stern cryptosystem. While by far less efficient than Turbo codes, the proposed ECC happens to be more efficient than some established ECCs for certain sets of parameters. The new ECC adds an appendix to the message. The appendix is the modular product of small primes representing the message bits. The receiver rec… ▽ More

    Submitted 1 September, 2015; originally announced September 2015.

  38. arXiv:1405.1402  [pdf, ps, other

    cs.CV

    New Algorithmic Approaches to Point Constellation Recognition

    Authors: Thomas Bourgeat, Julien Bringer, Herve Chabanne, Robin Champenois, Jeremie Clement, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard

    Abstract: Point constellation recognition is a common problem with many pattern matching applications. Whilst useful in many contexts, this work is mainly motivated by fingerprint matching. Fingerprints are traditionally modelled as constellations of oriented points called minutiae. The fingerprint verifier's task consists in comparing two point constellations. The compared constellations may differ by rota… ▽ More

    Submitted 24 March, 2014; originally announced May 2014.

    Comments: 14 pages, short version submitted to SEC 2014

  39. arXiv:1104.1546  [pdf, other

    cs.RO

    Physical Simulation of Inarticulate Robots

    Authors: Guillaume Claret, Michaël Mathieu, David Naccache, Guillaume Seguin

    Abstract: In this note we study the structure and the behavior of inarticulate robots. We introduce a robot that moves by successive revolvings. The robot's structure is analyzed, simulated and discussed in detail.

    Submitted 8 April, 2011; originally announced April 2011.

  40. arXiv:1104.1533  [pdf, ps, other

    cs.MS

    Operand Folding Hardware Multipliers

    Authors: Byungchun Chung, Sandra Marcello, Amir-Pasha Mirbaha, David Naccache, Karim Sabeg

    Abstract: This paper describes a new accumulate-and-add multiplication algorithm. The method partitions one of the operands and re-combines the results of computations done with each of the partitions. The resulting design turns-out to be both compact and fast. When the operands' bit-length $m$ is 1024, the new algorithm requires only $0.194m+56$ additions (on average), this is about half the number of ad… ▽ More

    Submitted 8 April, 2011; originally announced April 2011.

  41. arXiv:0810.2067  [pdf, ps, other

    math.NT cs.CC cs.CR

    Divisibility, Smoothness and Cryptographic Applications

    Authors: David Naccache, Igor E. Shparlinski

    Abstract: This paper deals with products of moderate-size primes, familiarly known as smooth numbers. Smooth numbers play a crucial role in information theory, signal processing and cryptography. We present various properties of smooth numbers relating to their enumeration, distribution and occurrence in various integer sequences. We then turn our attention to cryptographic applications in which smooth… ▽ More

    Submitted 1 January, 2009; v1 submitted 11 October, 2008; originally announced October 2008.

    MSC Class: 11N25; 11Y16; 9460

  42. arXiv:cs/0510042  [pdf, ps, other

    cs.CR

    Secure and {\sl Practical} Identity-Based Encryption

    Authors: David Naccache

    Abstract: In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In essence, the new scheme divides Waters' public key size by a factor $\ell$ at the cost of (negligibly) reducing security by $\ell$ bits. Theref… ▽ More

    Submitted 15 October, 2005; originally announced October 2005.

    ACM Class: K.6.5