Contents
Academic literature on the topic 'Générateur aléatoire de tresses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Générateur aléatoire de tresses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Générateur aléatoire de tresses"
Bassino, Frédérique, Mathilde Bouvel, Adeline Pierrot, Carine Pivoteau, and Dominique Rossin. "Combinatorial specification of permutation classes." Discrete Mathematics & Theoretical Computer Science DMTCS Proceedings vol. AR,..., Proceedings (January 1, 2012). http://dx.doi.org/10.46298/dmtcs.3082.
Full textDissertations / Theses on the topic "Générateur aléatoire de tresses"
Maffre, Samuel. "Conjugaison et cyclage dans les groupes de Garside, applications cryptographiques." Limoges, 2005. http://aurore.unilim.fr/theses/nxfile/default/a2d5043f-56f9-490f-9b58-18c1b0f7d718/blobholder:0/2005LIMO0028.pdf.
Full text. This work deals with braid based cryptography. We study the conjugacy search problem and the cycling problem presented by K. H. Ko, S. J. Lee and al. At CRYPTO 2000 (LNCS 1880) in New public-key cryptosystem using braid groups. On the one hand, we give a polynomial time algorithm to inverse the cycling function in Garside group which are a generalization of braid groups ; that allows to solve practically the cycling problem. On the other hand, our work on the conjugacy search problem and its variants emphasizes the choice of random generator of braids in protocols. We give an algorithm that factorizes the secret into a divisor and a multiple. That allows to define two new conjugacy instances with shorter secrets. Moreover, we exploit the fact that a braid group has two distinct Garside structures to improve the efficiency of the reduction. We observe that the choice of random generators influences greatly the security of an instance and we give several constructive and encouraging elements for further research in the design of good random generator of braids
Lacharme, Patrick. "Générateur vraiment aléatoire dans un composant sécurisé." Toulon, 2007. http://www.theses.fr/2007TOUL0025.
Full textSystems of security based on cryptographic algorithm; use a lot of random HP-quences. For smart card applications, a random generator must to have a small size, without fails in its security. The main objective of this thesis is to propose an alternative to classical generators, in order to be inplemented on small components. The differonts parts of this work are the construction of an architecture for a random generator for small size components, the analysis and the inplementation of the mathematical corrector for an estimation of the quality of the. Output random sequence
Rovetta, Christelle. "Simulation parfaite de réseaux fermés de files d’attente et génération aléatoire de structures combinatoires." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLEE051/document.
Full textRandom generation of combinatorial objects is an important problem in many fields of research (communications networks, theoretical computing, combinatorics, statistical physics, ...). This often requires sampling the stationary distribution of an ergodic Markov chain. In 1996, Propp and Wilson introduced an algorithm to produce unbiased samples of the stationary distribution, also called a perfect sampling algorithm. It requires parallel simulation of all possible states of the chain. To avoid simulating all the trajectories, several strategies have been implemented. But they are related to the structure of the chain and require a monotonicity property, or a construction of a bounding chain that exploits the lattice structure of the state space or the local character of the transitions.In the field of communications networks, attention is paid to the performance of queueing networks, that can be distinguished into two groups: the networks that have a product form stationary distribution which is easy to compute. Random generation can be used for the others. Perfect sampling algorithms can be used for open queueing networks, thanks to the lattice structure of their state space. Unfortunately, that is not the case for closed queueing networks, due to the size of the state space which is exponential in the number of queues and a global constraint (a constant number of customers). The main contribution of this thesis is a new data structure called a diagram. It is inspired by dynamic programming and allows a new technique of construction of bounding processes. The first part of the manuscript is devoted to the implementation of the Propp and Wilson algorithm for closed queueing networks. The representation of a set of states by a diagram and the transition operation for the bounding process has a polynomial complexity in the number of queues and customers. This technique is extended to closed multi-class networks and to networks with synchronizations. Specification of sets of objects that can be represented by a diagram and generic algorithms that use this data structure are proposed in this manuscript. The Boltzmann method is another unbiased sampling technique. It is based on analytical combinatorics and produces uniform samples from objects that belong to the same combinatorial class. It is used in the second part of this thesis in order to sample the stationary distribution of closed networks with product form and for the generation of multisets of fixed cardinality. Diagrams are used again in this context. Finally, the third part presents the software produced during this thesis, implementing diagrams and perfect simulation of closed queueing networks
Azakkour, Abdellatif. "Etude et conception d' une architecture ultra-large bande." Paris 6, 2005. http://www.theses.fr/2005PA066117.
Full textMasmoudi, Atef. "Elaboration et analyse de nouveaux algorithmes de crypto-compression basés sur le codage arithmétique." Thesis, Montpellier 2, 2010. http://www.theses.fr/2010MON20197/document.
Full textActually, we live in a digital society. The proliferation of the Internet and the rapid progress in information technology on multimedia, have profoundly transformed the way we communicate. An enormous amount of media can be easily exchanged through the Internet and other communication networks. Digital image in particular occupies an important place in modern interpersonal communication. However, image data have special features such as bulk capacity. Thus, image security and compression issues have became exceptionally acute. It is these considerations that have guided this thesis. Thus, we propose throw this thesis to incorporating security requirements in the data compression system to ensure reasonable security without downgrading the compression performance.For lossless image compression, we have paid most attention to the arithmetic coding (AC) which has been widely used as an efficient compression algorithm in the new standards including JBIG, JBIG2, JPEG2000 and H.264/AVC. For image encryption, we are based on the combination of a chaotic system and the Engel continued fraction map to generate key-stream with both good chaotic and statistical properties. First, we have proposed two new schemes for lossless image compression based on adding new pre-treatment steps and on proposing new modeling methods to estimate probabilities for AC. Experimental results demonstrate that the proposed schemes give mean compression ratios that are significantly higher than those by the conventional AC. In addition, we have proposed a new pseudo-random bit generator (PRBG). The detailed analysis done by NIST statistical test Suite demonstrates that the proposed PRGB is suitable for cryptography. The proposed PRBG is used to develop a new symmetr ic stream cipher for image encryption. Theoretic and numerical simulation analyses indicate that our image encryption algorithm is efficient and satisfies high security. Finally, we have proposed a new scheme which performs both lossless compression and encryption of image. The lossless compression is based on the binary AC (BAC) and the encryption is based on the proposed PRBG. The numerical simulation analysis indicates that the proposed compression and encryption scheme satisfies highly security with no loss of the BAC compression efficiency
Cassinelli, Alvaro. "Processeurs parallèles optoélectroniques stochastiques pour le traitement d'images en temps réel." Phd thesis, Université Paris Sud - Paris XI, 2000. http://pastel.archives-ouvertes.fr/pastel-00715890.
Full textWang, You. "Analyse de fiabilité de circuits logiques et de mémoire basés sur dispositif spintronique." Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0005/document.
Full textSpin transfer torque magnetic tunnel junction (STT-MTJ) has been considered as a promising candidate for next generation of non-volatile memories and logic circuits, because it provides a perfect solution to overcome the bottleneck of increasing static power caused by CMOS technology scaling. However, its commercialization is limited by the poor reliability, which deteriorates severely with device scaling down. This thesis focuses on the reliability investigation of MTJ based non-volatile circuits. Firstly, a compact model of MTJ including main reliability issues is proposed and validated by the comparison with experimental data. Based on this accurate model, the reliability of typical circuits is analyzed and reliability optimization methodology is proposed. Finally, the stochastic switching behavior is utilized in some new designs of conventional applications
Telandro, Vincent. "Conception d'un système d'alimentation intégré dédié à la sécurisation des cartes à puce." Phd thesis, Université de Provence - Aix-Marseille I, 2007. http://tel.archives-ouvertes.fr/tel-00268363.
Full text