Dissertations / Theses on the topic 'Hachiue'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Hachiue.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Zegour, Djamel Eddine. "Extensions du hachage digital : hachage digital multiniveaux, hachage digital avec représentations séquentielles... /." Le Chesnay : Institut national de recherche en informatique et en automatique, 1988. http://catalogue.bnf.fr/ark:/12148/cb349542450.
Full textZegour, Djamel Eddine. "Extensions du hachage digital : hachage digital multi niveaux, hachage digital avec représentations séquentielles." Paris 9, 1988. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=1988PA090009.
Full textBoura, Christina. "Analyse de fonctions de hachage cryptographiques." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2012. http://tel.archives-ouvertes.fr/tel-00767028.
Full textTillich, Jean-Pierre. "Fonctions de hachage pour la cryptographie." Paris : Ecole nationale supérieure des Télécommunications, 1994. http://catalogue.bnf.fr/ark:/12148/cb35723458t.
Full textPeyrin, Thomas. "Analyse de fonctions de hachage cryptographiques." Versailles-St Quentin en Yvelines, 2008. http://www.theses.fr/2008VERS0010.
Full textHash functions are one of the most useful primitives in cryptography, for example in authentication or message integrity solutions. Even if we also sat ourselves in the design side during this research time, we will mostly concentrate on hash functions cryptanalysis in this thesis. Firstly, we study and extend recent attacks on the standardized hash functions from the SHA family, by far the most utilized candidate in practice. We present the best known practical attacks against SHA-0 and SHA-1. Then, we describe the first algorithm that finds collisions for the GRINDAHL family of hash functions, a new candidate based on innovative design concepts. Finally, we analyse the hash function FORK-256 and show that it can not be considered as cryptographically strong
Leurent, Gaëtan. "Construction et Analyse de fonctions de Hachage." Paris 7, 2010. http://www.theses.fr/2010PA077124.
Full textHash fonctions are cryptographic fonctions with no structural properties. It is an essential primitive in modem cryptography, used in many protocols and standards, including signature schemes, authentication codes, and key derivation. Hash fonction study is a very active topic currently because of the SHA-3 competition. This competition is organised by NIST to select a new hash fonction standard, after devastating attacks against the most widely used hash fonction : MD4, MD5, and SHA-1. My work has been organized around this competition. In the part, I studied the new attacks of Wang et. Al. Against MD4 and MD5. 1 describe some improvements of these attacks, and new applications to higher-level constructions. In the second part, I describe a new hash fonction, SIMD, which has been submitted to NIST for the SHA-3 competition. The design of SIMD follows ideas from the MD4 family, but I used my knowledge of this family to make it resistant to most attacks. Finally, in the third part, I describe new attacks against SHA-3 candidates. I describe new attacks techniques which are general enough to apply to several hash fonctions or block ciphers. Thus, this thesis covers the two main realms of symmetric cryptography: design and analysis
Manuel, Stéphane. "Analyse et conception de fonctions de hachage cryptographiques." Phd thesis, Ecole Polytechnique X, 2010. http://pastel.archives-ouvertes.fr/pastel-00573346.
Full textFuhr, Thomas. "Conception, preuves et analyse de fonctions de hachage cryptographiques." Phd thesis, Télécom ParisTech, 2011. http://pastel.archives-ouvertes.fr/pastel-00674580.
Full textLanglois, Julie. "Une fonction de hachage basée sur la théorie du chaos." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28237/28237.pdf.
Full textHadmi, Azhar. "Protection des données visuelles : analyse des fonctions de hachage perceptuel." Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20159/document.
Full textThe widespread use of multimedia technology has made it relatively easy to manipulate and tamper visual data. In particular, digital image processing and image manipulation tools offer facilities to intentionally alter image content without leaving perceptual traces. This presents a serious problem, particularly if the authenticity of the digital image is required. The image authentication should be based on their visual content and not on their binary content. Therefore, to authenticate an image, some acceptable manipulations that could undergoes an image, such as JPEG compression and Gaussian noise addition, must tolerated. Indeed, these manipulations preserve the visual appearance of the image. At the same time a perceptual hashing system should be sufficiently sensitive to detect malicious manipulations that modify the interpretation of the semantic content of the imagesuch as adding new objects, deleting or major modification of existing objects.In this thesis, we focus on perceptual hash functions for authentication and integrityverification of digital images. For this purpose, we present all aspects of perceptual hashfunctions. Then, we discuss the constraints that perceptual hashing system must satisfy tomeet desired level of robustness of perceptual signatures. Finally, we present a method toimprove the robustness and security of a system of perceptual hashing
Tibouchi, Mehdi. "Hachage vers les courbes elliptiques et cryptanalyse de schémas RSA." Paris 7, 2011. http://www.theses.fr/2011PA077103.
Full textThis thesis consists of two independent parts, devoted to both aspects of cryptology: construction and analysis. Contributions to cryptography proper, on the one hand, address open questions in algebraic curve-based cryptography, particularly the problem of encoding and hashing to elliptic curves. We derive some quantitative results on curve-valued encoding fonctions, and give a satisfactory construction of hash fonctions based on those encodings, using a range of mathematical techniques from fonction field arithmetic, the algebraic geometry of curves and surfaces, and character sums. We also worked on a more implementation-related problem in elliptic curve cryptography, namely the construction of fast addition and doubling formulas. Our cryptanalytic work, on the other hand, focuses on RSA-based cryptoSystems—mostly encryption and signature schemes. We have obtained and carried out new attacks on standardized padding schemes that remain in widespread use, including ISO/IEC 9796-2 for signatures and PKCS#1 vl. 5 for encryption. We also propose new physical fault attacks on RSA signature schemes using the Chinese Remainder Theorem, and a stronger attack on RSA schemes relying on small hidden-order subgroups. The tools involved include index calculus, lattice reduction techniques and efficient arithmetic of large degree polynomials
Naya-Plasencia, Maria. "Chiffrements à flots et fonctions de hachage : conception et cryptanalyse." Paris 6, 2009. http://www.theses.fr/2009PA066526.
Full textPagès, Julien. "Une machine virtuelle en héritage multiple basée sur le hachage parfait." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT282/document.
Full textThis thesis is about object-oriented languages in multiple inheritance and static typing executed by virtual machines.We are in the context of a Java-like language and system but in multiple inheritance.A virtual machine is an execution system which is different from static compilers and interpreters since they are in dynamic loading.This characteristic makes classes to be discovered during the execution.The thesis' goal is to study, specify and implement a virtual machine for an object-oriented language in multiple inheritance and then in a second step to specify and implement compilation/recompilation protocols.These protocols are in charge of optimizations and unavoidable repairing.We will present the architecture of the virtual machine : the used language is Nit, and perfect hashing as the multiple inheritance implementation technique. Then we will present the protocols and the experiments.In this thesis, we have presented an extension of preexistence and concrete types analysis to increase optimization opportunities. This contribution is not limited to multiple inheritance object-oriented languages
Reinhard, Jean-René. "Etude de primitives cryptographiques symétriques : chiffrements par flot et fonction de hachage." Versailles-St Quentin en Yvelines, 2011. http://www.theses.fr/2011VERS0033.
Full textIn this thesis, we study the security of symmetric cryptographic functions. In a first part, we study stream ciphers from a cryptanalysis point of view. We present the main attack principles and focus on algebraic cryptanalysis. We also present a practical time differential cryptanalysis of the VEST stream ciphers family, one of the candidate of the eSTREAM project. In a second part, we study the conception of cryptographic hash functions. We present two security proofs of indifferentiability from a random oracle of the domain extension of Shabal, a candidate to the SHA-3 competition. The first proof assumes that the internal primitive Shabal relies on behaves ideally. The second proof enables to take into account non ideal behaviour of the primitive. New techniques of independant interest are developed to achieve this goal
Ben, Hadj Slama Jaleleddine. "Modélisation du rayonnement électromagnétique des circuits d'électronique de puissance : Application à un hacheur." Phd thesis, Ecole Centrale de Lyon, 1997. http://tel.archives-ouvertes.fr/tel-00260191.
Full textBournon, Loïc. "Applications de la reduction de reseaux et nouvelle cryptanalyse d'une fonction de hachage." Toulon, 1995. http://www.theses.fr/1995TOUL0005.
Full textFayçal, Marguerite. "Routage Efficace pour les Réseaux Pair-à-Pair utilisant des Tables de Hachage Distribuées." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00521935.
Full textKenmegne, Kamdem Amos Théophile. "Étude des propriétés mécaniques de la viande en relation avec le procédé de hachage." Vandoeuvre-les-Nancy, INPL, 1995. http://www.theses.fr/1995INPL015N.
Full textMorales, Sébastien. "Le hacheur aérodynamique : un nouvel instrument dédié aux processus réactionnels à ultra-basse température." Rennes 1, 2009. http://www.theses.fr/2009REN1S127.
Full textStudies on reactive processes under extreme conditions has proved to be of great interest for its multiple applications (reaction rate theory, astrophysics,. . . ). The CRESU technique (Cinétique de Réaction en Ecoulement Supersonique Uniforme) has been developed in the Rennes Experimental Astrochemistry team for the study of molecular collisions at very low temperatures (down to 15 K). This technique, based on the use of a Laval nozzle which generates a cold supersonic flow by an isentropic expansion, is the best adapted method for this kind of study under such conditions. However, the technique is limited by two main constraints : the large consumption of gas and the large pumping capacity necessary to obtain very low temperatures. The first part of this thesis presents an example of the possibilities of the CRESU technique – kinetic studies of the reaction between the CN radical and several hydrocarbons (1,3-butadiène, butyne, propane and propene) over a temperature range of 23 to 300 K. The majority of the reactions studied are rapid, with rate constants greater than 10-10 cm3 molécule-1 s-1, even at low temperature. Implications of these results for both low temperature reactivity and the modeling of Titan’s atmosphere are discussed. Finally, the second part of this manuscript describes the development, design and performance of a new invention, based on an evolution of the CRESU technique toward a pulsed mode. This new apparatus, called an “Aerodynamic Chopper”, allows us to avoid some of the CRESU technique’s disadvantages, reducing strongly the necessary pumping capacity. Results obtained with the prototype demonstrate the great potential of this new apparatus by characterizing the pulsed flow and studying chemical kinetics at 22 K (CN+O2 et CN+C3H8). The Aerodynamic Chopper will enable us to study costly or difficult to synthesize compounds and broaden the use of uniform supersonic flow techniques by making possible their development in laboratories with limited pumping capacity. From these results, it is reasonable to predict that the Aerodynamic Chopper will enable us, in the immediate future, to reach temperatures below 10 K, and eventually even to approach sub-Kelvin temperatures
Noura, Hassan. "Conception et simulation des générateurs, crypto-systèmes et fonctions de hachage basés chaos performants." Nantes, 2012. http://archive.bu.univ-nantes.fr/pollux/show.action?id=b731eb67-2055-4330-80f5-c13829044fbc.
Full textIn this thesis, we study the problem of chaos based information security and its services namely: the confidentiality, the data integrity and the source authentication. Firstly, the generation of efficient chaotic sequences problem is treated. Thus, we propose three efficient generators, each one including a perturbation technique to overcome the inconveniences of the finite precision. The first generator uses a coupling of non linear Boolean functions. The second generator is based on a flexible and effective layer of global diffusion. The third generator uses the parallel coupling of two non linear recursive filters. Then, the question of the design and the implementation of a strong and fast chaos based crypto-systems is studied and analyzed. Concerning this issue, we propose, two dynamic chaos based crypto-systems of structure SPN, very efficient compared with the AES algorithm. The second crypto-system contains with regard to the first one, a layer of effective diffusion, but does not require operations of decimal towards binary and binary towards decimal conversions. The quantification of the performances is achieved, at every layer and globally, using adequate tools. Both cryptosystems are suitable for software and hardware implementations. Finally, a new efficient chaos based hash function, with or without key is proposed. It allows effectively the services of the data integrity and the source authentication
Ngom, Bassirou. "FreeCore : un système d'indexation de résumés de document sur une Table de Hachage Distribuée (DHT)." Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS180/document.
Full textThis thesis examines the problem of indexing and searching in Distributed Hash Table (DHT). It provides a distributed system for storing document summaries based on their content. Concretely, the thesis uses Bloom filters (BF) to represent document summaries and proposes an efficient method for inserting and retrieving documents represented by BFs in an index distributed on a DHT. Content-based storage has a dual advantage. It allows to group similar documents together and to find and retrieve them more quickly at the same by using Bloom filters for keywords searches. However, processing a keyword query represented by a Bloom filter is a difficult operation and requires a mechanism to locate the Bloom filters that represent documents stored in the DHT. Thus, the thesis proposes in a second time, two Bloom filters indexes schemes distributed on DHT. The first proposed index system combines the principles of content-based indexing and inverted lists and addresses the issue of the large amount of data stored by content-based indexes. Indeed, by using Bloom filters with long length, this solution allows to store documents on a large number of servers and to index them using less space. Next, the thesis proposes a second index system that efficiently supports superset queries processing (keywords-queries) using a prefix tree. This solution exploits the distribution of the data and proposes a configurable distribution function that allow to index documents with a balanced binary tree. In this way, documents are distributed efficiently on indexing servers. In addition, the thesis proposes in the third solution, an efficient method for locating documents containing a set of keywords. Compared to solutions of the same category, the latter solution makes it possible to perform subset searches at a lower cost and can be considered as a solid foundation for supersets queries processing on over-dht index systems. Finally, the thesis proposes a prototype of a peer-to-peer system for indexing content and searching by keywords. This prototype, ready to be deployed in a real environment, is experimented with peersim that allowed to measure the theoretical performances of the algorithms developed throughout the thesis
Capron, Jean-Marc. "Modélisation des diodes de puissance et application aux pertes des convertisseurs de type hacheur et onduleur." Lille 1, 1992. http://www.theses.fr/1992LIL10143.
Full textHache, Karl Helmer [Verfasser]. "Einfluss von Resolvin E1 auf die pulmonale Inflammation / Karl Helmer Hache." Gießen : Universitätsbibliothek, 2021. http://d-nb.info/1233036815/34.
Full textTucker, Ida. "Chiffrement fonctionnel et signatures distribuées fondés sur des fonctions de hachage à projection, l'apport des groupes de classe." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEN054.
Full textOne of the current challenges in cryptographic research is the development of advanced cryptographic primitives ensuring a high level of confidence. In this thesis, we focus on their design, while proving their security under well-studied algorithmic assumptions.My work grounds itself on the linearity of homomorphic encryption, which allows to perform linear operations on encrypted data. Precisely, I built upon the linearly homomorphic encryption scheme introduced by Castagnos and Laguillaumie at CT-RSA'15. Their scheme possesses the unusual property of having a prime order plaintext space, whose size can essentially be tailored to ones' needs. Aiming at a modular approach, I designed from their work technical tools (projective hash functions, zero-knowledge proofs of knowledge) which provide a rich framework lending itself to many applications.This framework first allowed me to build functional encryption schemes; this highly expressive primitive allows a fine grained access to the information contained in e.g., an encrypted database. Then, in a different vein, but from these same tools, I designed threshold digital signatures, allowing a secret key to be shared among multiple users, so that the latter must collaborate in order to produce valid signatures. Such signatures can be used, among other applications, to secure crypto-currency wallets. Significant efficiency gains, namely in terms of bandwidth, result from the instantiation of these constructions from class groups. This work is at the forefront of the revival these mathematical objects have seen in cryptography over the last few years
SAITO, Takeshi. "Pollen Morphology and Species-level Distinction of the Genus Fagus from the Hachiya Formation (Lower Miocene), Mizunami Group, Japan." Dept. of Earth and Planetary Sciences, Nagoya University, 1992. http://hdl.handle.net/2237/2812.
Full textPercin-Sermet, Charlotte de. "Caṇḍeśa le dévot à la hache, étude iconographique (Tamil Nadu VIIIème-XIIIème siècles)." Thesis, Paris 4, 2011. http://www.theses.fr/2011PA040221.
Full textIt is commonly admitted that Caṇḍeśa is one of the 63 śaivite South Indian saints, usually known as the Nāyānar. Butamong them, he enjoys a special place as he is the only one to whom a shrine is dedicated in very important temples such asTanjavur, Gaṇgaikōṇḍacōḷapuram, Darasuram, Tribhūvanam. In fact he was considered a parivāradevatā since the Cōḷaperiod. This study attempts to analyze the evolution of Candesa’s Images and the development of his different iconographicaltypes, from his appearance during the Pallava period (VIIIth century) until the XIIIth century. Textual sources help to determinethe personality of the young bhākta. The fact that Caṇḍa is mentioned as a name of Śiva in the Mahābhārata reveals that hisroots are very ancient. Archaeological and textual evidence shows that he was in charge of the nirmālya, the remains of thesacred offerings to Śiva. Cōḷa inscriptions mentioned him as «ādidāsa », the first devotee. He was recognized as an importantdeity of the South Indian pantheon during the medieval period. To fulfil his duties, Caṇḍeśa took several forms. During the earlyperiod of his evolution he could be considered as a watchman, as in Bhairavakoṇḍa, where he sits at the cave temple’sentrance. A little later, another iconographical form, the Caṇḍeśānugrahamūrti, showed how he was chosen and deified by Śiva.To take care of the sacrificial remains, shrines of Caṇḍeśa were built near Śiva temples (at the North-East corner). Inside hischapel, Caṇḍeśa was often represented as a two-armed deity holding the hatchet with one hand, forming the āhūyavaradamudrā with the other. As he grew popular his iconography was enriched by four-armed and many-headed sculptures. At thesame time bronze images were cast so that he was honoured to take part in several temple festivals
Tran, Le Trang Delphine. "Étude et réalisation de la commande numérique d'un moteur à courant continu alimenté par hacheur et destiné à la robotique." Toulouse, INPT, 1988. http://www.theses.fr/1988INPT022H.
Full textViana, Aline Carneiro. "Localisation et routage dans les réseaux auto organisables à large échelle : des tables de hachage distribuées aux structures d'adressage adaptatives." Paris 6, 2005. http://www.theses.fr/2005PA066191.
Full textBennour, Sahli Fethi. "Un gestionnaire de structures de données distribuées et scalables pour les multi-ordinateurs Windows : application à la fragmentation par hachage." Paris 9, 2000. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2000PA090043.
Full textSmoacà, Andreea. "ID Photograph hashing : a global approach." Phd thesis, Université Jean Monnet - Saint-Etienne, 2011. http://tel.archives-ouvertes.fr/tel-00719585.
Full textHidalgo, Castillo Nicolas Andres. "Amélioration de la performance de requêtes complexes sur les systèmes pair-à-pair." Paris 6, 2011. http://www.theses.fr/2011PA066660.
Full textLion, Jérôme Delabroy Jean. "La hache et l'épée politique et poétique de la guerre chez Victor Hugo, 1870-1878 /." Lille : A.N.R.T, 2004. http://www.univ-lille3.fr/theses/lion-jerome.pdf.
Full textBorges, Nádia Melo. "Similaridade, docking e dinâmica molecular : combinação de estratégias na busca de novos inibidores da hAChE." reponame:Repositório Institucional da UnB, 2017. http://repositorio.unb.br/handle/10482/32278.
Full textSubmitted by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-20T16:38:43Z No. of bitstreams: 1 2017_NádiaMeloBorges.pdf: 7243878 bytes, checksum: b3014e3c4560fc6a4a0b56d8c0e5eb0d (MD5)
Approved for entry into archive by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-20T19:35:48Z (GMT) No. of bitstreams: 1 2017_NádiaMeloBorges.pdf: 7243878 bytes, checksum: b3014e3c4560fc6a4a0b56d8c0e5eb0d (MD5)
Made available in DSpace on 2018-07-20T19:35:48Z (GMT). No. of bitstreams: 1 2017_NádiaMeloBorges.pdf: 7243878 bytes, checksum: b3014e3c4560fc6a4a0b56d8c0e5eb0d (MD5) Previous issue date: 2018-07-20
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES).
A doença de Alzheimer é a forma mais comum de demência irreversível entre as pessoas idosas. A diminuição dos níveis de acetilcolina no cérebro de pacientes com a doença está relacionada com a fisiopatologia da doença. A hipótese colinérgica é baseada no aumento do nível de acetilcolina pela inibição reversível da enzima acetilcolinesterase. O objetivo principal deste trabalho é abordar o desempenho de métodos de triagem virtuais com base no ligante e na estrutura da proteína afim de encontrar novos candidatos a inibidores da acetilcolinesterase. Além disso, um protocolo foi desenvolvido para identificar e propor novos inibidores promissores da AChE a partir do banco de dados ZINC com 10 milhões de compostos disponíveis comercialmente. Neste sentido, busca por similaridade 3D usando similaridade por forma e eletrostática além do método de docagem para uma série de compostos foram utilizados para recuperar inibidores da AChE a partir de uma coleção de banco de dados. Simulação por dinâmica molecular foi realizada para estudar os melhores compostos docados. Alguns resíduos importantes foram identificados como indispensáveis para formação do duplo modo de interação entre os compostos selecionados e o sítio de interação da enzima. Todos os resultados indicam o relevante uso do método de similaridade eletrostática combinado com estratégias de docagem para identificar novos possíveis inibidores, e sete novas estruturas foram selecionadas como potentes candidatos anticolinesterásicos.
Alzheimer's disease is the most common cause of irreversible dementia among the elderly. The decrease of acetylcholine levels in the brain of patients with the disease is related to the pathophysiology of the disease. The cholinergic hypothesis is based on increasing the level of acetylcholine by the reversible inhibition of the enzyme acetylcholinesterase. The main purpose of this study is to address the performance of virtual screening methods based on ligands and the protein structure of acetylcholinesterase in order to retrieve novel hAChE inhibitors. In addition, a protocol was developed to identify novel hit compounds and propose new promising AChE inhibitors from ZINC database with 10 million commercially available compounds. In this sense, 3D similarity searches using Rapid Overlay of Chemical Structures and similarity analysis through comparison of electrostatic overlay of docked hits were used to retrieve AChE inhibitors from collected databases. Molecular dynamics simulation of 100 ns was carried out to study the best docked compounds from similarity search. Some key residues are identified as crucial for the dual binding mode of inhibitor with interaction site. All results indicated the relevant use of EON and docking strategy for identifying novel hit compounds as promising potential anticholinesterase candidates, and seven new structures were selected as potential hAChE inhibitors.
Lion, Jérôme. "La hache et l'épée : politique et poétique de la guerre chez Victor Hugo, 1870-1878." Lille 3, 2004. http://www.theses.fr/2004LIL30050.
Full textDayhum, Abdunaser. "Appréciation du risque de contamination de l'homme par des Salmonella spp à partir de produit d'origine bovine : viande hachée." Phd thesis, AgroParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00003795.
Full textHachimi, Mohammed el Verfasser], Paul [Akademischer Betreuer] [Mecheril, and Rudolf [Akademischer Betreuer] Leiprecht. "Berufliche Aufstiege von Menschen mit Migrationshintergrund : eine qualitativ-methodische Rekonstruktion ihrer Strategien, Barrieren und Aufstiegsverläufe / Mohammed el Hachimi ; Paul Mecheril, Rudolf Leiprecht." Oldenburg : BIS der Universität Oldenburg, 2016. http://d-nb.info/113125306X/34.
Full textIdir, Nadir. "Modélisation des commutations du thyristor GTO dans une structure hacheur série par la technique Bond-Graph : application au fonctionnement en interrupteur résonnant." Lille 1, 1993. http://www.theses.fr/1993LIL10144.
Full textHachimi, Mohammed el [Verfasser], Paul [Akademischer Betreuer] Mecheril, and Rudolf [Akademischer Betreuer] Leiprecht. "Berufliche Aufstiege von Menschen mit Migrationshintergrund : eine qualitativ-methodische Rekonstruktion ihrer Strategien, Barrieren und Aufstiegsverläufe / Mohammed el Hachimi ; Paul Mecheril, Rudolf Leiprecht." Oldenburg : BIS der Universität Oldenburg, 2016. http://nbn-resolving.de/urn:nbn:de:gbv:715-oops-32529.
Full textMatusiak, Stanislaw. "Description invariante et locale des formes planes : application à l'indexation d'une base d'images." Valenciennes, 1999. https://ged.uphf.fr/nuxeo/site/esupversions/7570969d-50dd-44f1-84ef-c2e50a0fa07d.
Full textThis Ph. D. Contributes to the subject of indexing and pattern recognition in an image database constituted of object contours, by the use of local invariant descriptions. Our approach allows to recognize objects, even if they are partially occluded or observed at different viewpoints, since it is based on a local and invariant characterization of contours. One of the fundamental problems of indexing an image database resides in the choice of the invariant description of the image. Indeed, it is agreed that the request never corresponds exactly to the research image, affine transformations can separate them. Hence the description of the contour has a possess invariance properties so as to confer robustness to the recognition system. A general framework allowing to unify different local descriptions has been elaborated. This unification lead us propose two invariant descriptions with respect to affine transformations: the first one is based on points of interest of curves and the second one on the multi-scale analysis contours. Invariant descriptions, proposed in this work, have been applied to retrieval of objects-contours in image database. First of all, we have proposed a solution to the problem of object retrieval by sketch. The user draws his request on a graphic interface: the request image is made of a contour on uniform background. Then, its description by multi-scale curvatures allows to extract indexes. Finally, to undertake a rapid retrieving from a large image database, a mechanism of indexing based on the geometric hashing has been developed
Laabi, Abderrazzak. "Étude et réalisation de la gestion des articles appartenant à des bases de données gérées par une machine bases de données." Paris 11, 1987. http://www.theses.fr/1987PA112338.
Full textThe work presented in this thesis is part of a study and development project concerning the design of three layers of the DBMS on the DORSAL-32 Data Base Machine. The first layer ensures record management within the storage areas, record and page locking organization according to the access mode and transaction coherency degree. It ensures also the handling of micro-logs which permit to guarantee the atomicity of an action. The second layer ensures handling of transaction logging and warm restarts which guarantee the atomicity and durability of a transaction. The third layer ensures simultaneous access management and handling of lock tables. Performance measures of the methods used are also presented. The last chapter of this report contains a research work concerning the implementation of the virtual linear hashing method in our DBMS. The problem studied is the transfer of records from one page to another. Under these conditions, the record pointers which are classically used don't permit direct access. We propose a new pointer which enables direct access to the record, on no matter which page it is contained at a given instant
Fernandez, Isabelle. "Influence de la finesse de hachage des ensilages de maïs sur leur digestion (amidon et parois) et leur ingestibilité par les vaches laitières." Clermont-Ferrand 2, 2003. http://www.theses.fr/2003CLF21416.
Full textJourdan, Ludovic. "Stratégie de pré-dimensionnement de convertisseurs statiques : Application à une alimentation 42V-14V réversible pour l'automobile." Phd thesis, Université Joseph Fourier (Grenoble), 2002. http://tel.archives-ouvertes.fr/tel-00480432.
Full textAl, Mashhadani Mahmood Yaseen Hachim [Verfasser]. "The use of integrative OMICs to decipher heterogeneous chronic complex disease mechanism : severe asthma as a model / Mahmood Yaseen Hachim Al Mashhadani." Lübeck : Zentrale Hochschulbibliothek Lübeck, 2021. http://d-nb.info/1227545096/34.
Full textDosi, Francesca. "Trajectoires balzaciennes dans le cinéma de Jacques Rivette : Out1 - La belle noiseuse - Ne touchez pas à la hache." Thesis, Paris 3, 2013. http://www.theses.fr/2013PA030008.
Full textThis thesis follows the traces of Balzac’s presence in Jacques Rivette’s output and of thecomplex network of references, allusions and quotations that create a mirror image of thecobweb-like structure of the Comédie Humaine. These traces emerge particularly in threeworks overtly inspired by Balzac : Out 1, Noli me tangere (1970-71), an experimental filmfleuve approximately 13 hours long, built on actorial improvisation and centred on atransposition of the quest of Balzac’s Treize to contemporary times; La Belle Noiseuse (1991)which transposes and partly modifies the narrative of Le Chef-d’Oeuvre inconnu to thepresent of the filming process; and Ne touchez pas la hache (2007), a costume (and thus‘literally faithful’) reprise of La Duchesse de Langeais. Out 1 mixes surrealist flanerie toBalzac’s enigmatic narration in order to question the myth of the select group and thepsychedelic oneirism typical of the 1960s. As dramatisations of a novelistic ellipsis, themodel’s sittings in La Belle Noiseuse offer Rivette the opportunity to stage the process ofartistic creation and, at the same time, to reflect on his work as a filmmaker and on theenormous project of the Comédie Humaine. The “César-style” compression to which hesubmits La Duchesse de Langeais turns the narrative into an atemporal metaphysical treatiseon a lover’s impasse, as well as into the occasion for a meditation on Balzac’s philosophy andthe theatricality typical of the Comédie Humaine. Caught up between reprise andtransformation, Jacques Rivette’s films constitute as many re-elaborations that are, to differentdegrees, impregnated with Balzac’s powerful oeuvre, and thus delineate an original set offorms of assimilation, hybridisation and reinvention of literary texts on screen
Legendre, Florian. "Exploitation de la logique propositionnelle pour la résolution parallèle des problèmes cryptographiques." Thesis, Reims, 2014. http://www.theses.fr/2014REIMS006/document.
Full textDemocratization of increasingly high-Performance digital technologies and especially the Internet has considerably changed the world of communication. Consequently, needs in cryptography are more and more numerous and the necessity of verifying the security of cipher algorithms is essential.This thesis deals with a new cryptanalysis, called logical cryptanalysis, which is based on the use of logical formalism to express and solve cryptographic problems. More precisely, works presented here focuses on a particular category of ciphers, called cryptographic hash functions, used in authentication and data integrity protocols.Logical cryptanalysis is a specific algebraic cryptanalysis where the expression of the cryptographic problem is done through the satisfiabilty problem, fluently called sat problem. It consists in a combinatorial problem of decision which is central in complexity theory. In the past years, works led by the scientific community have allowed to develop efficient solvers for industrial and academical problems.Works presented in this thesis are the fruit of an exploration between satisfiability and cryptanalysis, and have enabled to display new results and innovative methods to weaken cryptographic functions.The first contribution is the modeling of a cryptographic problem as a sat problem. For this, we present some rules that lead to describe easily basic operations involved in cipher algorithms. Then, a section is dedicated to logical reasoning in order to simplify the produced sat formulas and show how satisfiability can help to enrich a knowledge on a studied problem. Furthermore, we also present many points of view to use our smooth modeling to apply a probabilistic reasoning on all the data associated with the generated sat formulas. This has then allowed to improve both the modeling and the solving of the problem and underlined a weakness about the use of round constants.Second, a section is devoted to practical attacks. Within this framework, we tackled preimages of the most popular cryptographic hash functions. Moreover, the collision problem is also approached in different ways, and particularly, the one-Bloc collision attack of Stevens on MD5 was translated within a logical context. It's interesting to remark that in both cases, logical cryptanalysis takes a new look on the considered problems
Durand, Marianne. "Combinatoire analytique et algorithmique des ensembles de données." Phd thesis, Ecole Polytechnique X, 2004. http://pastel.archives-ouvertes.fr/pastel-00000810.
Full textFiniasz, Matthieu. "Nouvelles constructions utilisant des codes correcteurs d'erreurs en cryptographie à clef publique." Palaiseau, Ecole polytechnique, 2004. http://www.theses.fr/2004EPXX0033.
Full textViret, Francine. "Au fil de la lame : essai sur la représentation de la hache sacrificielle et la construction des genres dans l'Athènes classique /." Gollion (Suisse) ; [Paris] : Infolio, 2008. http://catalogue.bnf.fr/ark:/12148/cb41405569v.
Full textLetessier, Pierre. "Découverte et exploitation d'objets visuels fréquents dans des collections multimédia." Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0014/document.
Full textThe main goal of this thesis is to discover frequent visual objects in large multimedia collections. As in many areas (finance, genetics, . . .), it consists in extracting a knowledge, using the occurence frequency of an object in a collection as a relevance criterion. A first contribution is to provide a formalism to the problems of mining and discovery of frequent visual objects. The second contribution is a generic method to solve these two problems, based on an iterative sampling process, and on an efficient and scalable rigid objects matching. The third contribution of this work focuses on building a likelihood function close to the perfect distribution. Experiments show that contrary to state-of-the-art methods, our approach allows to discover efficiently very small objects in several millions images. Finally, several applications are presented, including trademark logos discovery, transmedia events detection or visual-based query suggestion
Karpman, Pierre. "Analyse de primitives symétriques." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLX095/document.
Full textThis thesis is about block ciphers and cryptographic hash functions, which are two essential primitives of symmetric-key cryptography. In the first part of this manuscript, we study useful building blocks for block cipher design. We first consider large diffusion matrices builtfrom algebraic-geometry codes, and then construct a small S-box with good diffusion. In the second case, we show how the S-box can be used to define a compact and efficient block cipher targetting small processors. In the second part, we focus on the SHA-1 hash function, for which we develop a free start collision attack. We show how classical collision attacks can be made more efficient by exploiting the additional freedom provided by the model. This allows us in particular to compute explicit collisions for the full compression function of SHA-1