University of Paris

Displaying 1-25 of 25 results

  • White Papers // Oct 2012

    Leakage Squeezing of Order Two

    In masking schemes, leakage squeezing is the study of the optimal shares representation, that maximizes the resistance order against high-order side-channel attacks. Squeezing the leakage of first-order Boolean masking has been problematized and solved previously. The solution consists in finding a bijection F that modifies the mask, in such a...

    Provided By University of Paris

  • White Papers // Jun 2012

    Resistance to Pirates 2.0: A Method From Leakage Resilient Cryptography

    In the classical model of traitor tracing, one assumes that a traitor contributes its entire secret key to build a pirate decoder. However, new practical scenarios of pirate have been considered, namely Pirate Evolution Attacks at Crypto 2007 and Pirates 2.0 at Eurocrypt 2009, in which pirate decoders could be...

    Provided By University of Paris

  • White Papers // Jun 2012

    Multi-Channel Broadcast Encryption

    Broadcast encryption aims at sending a content to a large arbitrary group of users at once. Currently, the most efficient schemes provide constant-size headers that encapsulate ephemeral session keys under which the payload is encrypted. However, in practice, and namely for pay-TV, providers have to send various contents to different...

    Provided By University of Paris

  • White Papers // Apr 2012

    Modeling CSMA/CA in VANET

    In this paper, the authors propose a simple theoretical model to compute the maximum spatial reuse feasible in a VANET. They focus on the ad hoc mode of the IEEE 802.11p standard. Their model offers simple and closed formulae on the maximum number of simultaneous transmitters, and on the distribution...

    Provided By University of Paris

  • White Papers // Apr 2012

    Cross-Layer Loss Differentiation Algorithms to Improve TCP Performance in WLANs

    Loss Differentiation Algorithms (LDA) are currently used to determine the cause of packet losses with an aim of improving TCP performance over wireless networks. In this paper, the authors propose a cross-layer solution based on two LDA in order to classify the loss origin on an 802.11 link and then...

    Provided By University of Paris

  • White Papers // Apr 2012

    Optimal First-Order Masking with Linear and Non-Linear Bijections

    Hardware implementations of block-oriented cryptographic functions are vulnerable to side-channel attacks. Yet their lack of algebraic structure makes them hard to protect efficiently. Boolean masking is one answer to secure them, because it can be adapted to any function implemented. Early masking schemes involved only one mask per data to...

    Provided By University of Paris

  • White Papers // Apr 2012

    Generic Interference Processing for Wireless Networks With Any Number of Users

    In this paper, the authors investigate how to send space time codes with full diversity and low decoding complexity for Z channels using pre-coders with any number of users. They assume that they have J transmitters each with J transmit antennas and J receivers each with J receive antennas. Each...

    Provided By University of Paris

  • White Papers // Jan 2012

    A note on hyper-bent functions via Dillon-like exponents

    This paper is devoted to hyper-bent functions with multiple trace terms (including binomial functions) via Dillon-like exponents. The authors show how the approach developed by Mesnager to extend the Charpin - Gong family and subsequently extended by Wang et al. fits in a much more general setting. To this end,...

    Provided By University of Paris

  • White Papers // Jan 2012

    Dickson Polynomials, Hyperelliptic Curves and Hyper-Bent Functions

    In this paper, the authors study the action of Dickson polynomials on subsets of finite fields of even characteristic related to the trace of the inverse of an element and provide an alternate proof of a not so well-known result. Such properties are then applied to the study of a...

    Provided By University of Paris

  • White Papers // Apr 2011

    The Time-Free Approach to Byzantine Failure Detection in Dynamic Networks

    Modern distributed systems deployed over wireless ad-hoc networks are inherently dynamic and the issue of designing dependable services which can cope with the high dynamics of these systems is a challenge. Byzantine failure detectors provide an elegant abstraction for solving security problems; however, very few work has been proposed for...

    Provided By University of Paris

  • White Papers // Mar 2011

    Bargaining With Intertemporal Maximin Payoffs

    The authors present a new class of dynamic bargaining problems, called "Bargaining problems with intertemporal maximin payoffs," that may reflect sustainability problems having to encompass conflicting issues in the long-run. Each bargainer (or stake-holder) has a representative indicator, namely a function of the state and decisions, and aims at maximizing...

    Provided By University of Paris

  • White Papers // Jan 2011

    Health And Early Retirement: Evidence From French Data For Individuals

    Health status during the working life plays a major role in the retirement decision. Significant links between professional paths, retirement age and retirement conditions (disability pension, inability pension, reduced-rate pension, or full rate by age) can be highlighted by logistic models regressions and a typology of the professional careers of...

    Provided By University of Paris

  • White Papers // Jan 2011

    On the Capacity of the Channel Aware Slotted Aloha Over Rayleigh and Nakagami-M Channels

    The authors consider the channel aware slotted ALOHA protocol that has been recently proposed to improve the capacity of the traditional slotted ALOHA by using multi-user diversity. This type of diversity is commonly used in scheduling policies that allow terminals to transmit when their channel conditions are good. Here, they...

    Provided By University of Paris

  • White Papers // Dec 2010

    Why Do Banks Reward Their Customers To Use Their Credit Cards?

    Using a unique administrative level dataset from a large and diverse U.S. financial institution, the authors test the impact of rewards on credit card spending and debt. Specifically, they study the impact of 1 percent cash-back reward on individuals before and during their enrollment in the program. They find that...

    Provided By University of Paris

  • White Papers // Sep 2010

    Corporate Performances And Market Selection Some Comparative Evidence

    Diverse theories of industry dynamics predict heterogeneity in production efficiency to be the driver of firms' growth, survival and industrial change, either through a direct link between efficiency and growth, or through an indirect effect via profitability's, as more productive firms can enjoy higher profit margins which, under imperfect capital...

    Provided By University of Paris

  • White Papers // May 2010

    Dynamic Power Control for Wireless Backbone Mesh Networks: a Survey

    With the tremendous growth of wireless networks into the next generation to provide better services, Wireless Mesh Networks (WMNs) have emerged to offer ubiquitous communication and seamless broadband applications. WMNs are hybrid networks composed of a mixture of static Wireless Mesh Routers (WMRs) and mobile Wireless Mesh Clients (WMCs) interconnected...

    Provided By University of Paris

  • White Papers // May 2010

    European Literature And The Ethics Of Leadership: Cyrano De Bergerac

    This paper is built on an "Organizational" reading of "Great" texts, a reading focused on the leader, considering in a implicit way that he/she is a person with specific characters, circumstances being at left the background. This method is similar to the partial criticism made by the queer critic or...

    Provided By University of Paris

  • White Papers // Apr 2010

    A WhIMS For Financial Crises

    This paper introduces a quantitative measure of financial disturbances, which captures the heterogeneity of investor horizons - from day traders to pension funds. This risk measure, called "Wavelet-heterogeneous Index of Market Shocks" (WhIMS), is based on the combination of two methods: the Wavelet Packet Sub-band Decomposition and the constrained Independent...

    Provided By University of Paris

  • White Papers // Jan 2010

    QoS Routing in Ad Hoc Networks Using QOLSR With no Need of Explicit Reservation

    Multimedia applications often require guaranteed quality of service (QoS) and resource reservation, which has raised a number of challenging technical issues for routing. Authors have proposed the QOLSR protocol, a QoS routing over OLSR protocol introducing metrics such as bandwidth and delay that are more appropriate than the hop distance....

    Provided By University of Paris

  • White Papers // Jan 2010

    Accounting for Message Importance and Deadline in Bluetooth Piconet Scheduling

    This paper focuses on the ability of Bluetooth to support Quality of Service (QoS) requirements expressed by QoS sensitive applications. The QoS perceived by the application depends on the efficiency of the scheduling schemes chosen at the medium access layer. This paper focus on two QoS constraints: the importance degree...

    Provided By University of Paris

  • White Papers // May 2009

    WiMAX and End-to-End QoS Support

    The IEEE 802.16 Wireless Metropolitan Area Network (MAN) standard, upon which the Worldwide Interoperability for Microwave Access (WiMAX1) is based, took a big step forward with the publication in February 2006 of the 802.16e amendment, Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands....

    Provided By University of Paris

  • White Papers // Apr 2009

    Fast Dynamics in Internet Topology: Observations and First Explanations

    By focusing on what can be observed by running traceroute-like measurements at a high frequency from a single monitor to a fixed destination set, the authors show that the observed view of the topology is constantly evolving at a pace much higher than expected. Repeated measurements discover new IP addresses...

    Provided By University of Paris

  • White Papers // Apr 2009

    An Overview of Results on Ad Hoc Network Performances Using Spatial Models

    The authors propose a short overview of models and results based on spatial models used to evaluate the performance of ad hoc networks. Locations of nodes are distributed in a two dimensional area according to a stochastic point process, which allows them to obtain the averages and distributions of different...

    Provided By University of Paris

  • White Papers // Mar 2009

    Fault-Tolerant Consensus in Unknown and Anonymous Networks

    Most of the algorithms for distributed systems consider that the number of processes in the system is known and every process has a distinct ID. However, in some networks such as in wireless sensors networks, this is not necessarily true. Additionally, such networks are typically not totally synchronous and processes...

    Provided By University of Paris

  • White Papers // Jan 2009

    Banking Market Liberalization And Bank Performance: The Role Of Entry Modes

    This paper analyzes the evolution in bank performance following the removal of legal restrictions on the entry of foreign banks in three transition economies: the Czech Republic, Hungary, and Poland. Two modes of foreign bank entry are considered: entry by Greenfield investments, and by foreign mergers and acquisitions of domestic...

    Provided By University of Paris

  • White Papers // Oct 2012

    Leakage Squeezing of Order Two

    In masking schemes, leakage squeezing is the study of the optimal shares representation, that maximizes the resistance order against high-order side-channel attacks. Squeezing the leakage of first-order Boolean masking has been problematized and solved previously. The solution consists in finding a bijection F that modifies the mask, in such a...

    Provided By University of Paris

  • White Papers // Apr 2012

    Optimal First-Order Masking with Linear and Non-Linear Bijections

    Hardware implementations of block-oriented cryptographic functions are vulnerable to side-channel attacks. Yet their lack of algebraic structure makes them hard to protect efficiently. Boolean masking is one answer to secure them, because it can be adapted to any function implemented. Early masking schemes involved only one mask per data to...

    Provided By University of Paris

  • White Papers // Jan 2010

    QoS Routing in Ad Hoc Networks Using QOLSR With no Need of Explicit Reservation

    Multimedia applications often require guaranteed quality of service (QoS) and resource reservation, which has raised a number of challenging technical issues for routing. Authors have proposed the QOLSR protocol, a QoS routing over OLSR protocol introducing metrics such as bandwidth and delay that are more appropriate than the hop distance....

    Provided By University of Paris

  • White Papers // May 2009

    WiMAX and End-to-End QoS Support

    The IEEE 802.16 Wireless Metropolitan Area Network (MAN) standard, upon which the Worldwide Interoperability for Microwave Access (WiMAX1) is based, took a big step forward with the publication in February 2006 of the 802.16e amendment, Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands....

    Provided By University of Paris

  • White Papers // Jan 2010

    Accounting for Message Importance and Deadline in Bluetooth Piconet Scheduling

    This paper focuses on the ability of Bluetooth to support Quality of Service (QoS) requirements expressed by QoS sensitive applications. The QoS perceived by the application depends on the efficiency of the scheduling schemes chosen at the medium access layer. This paper focus on two QoS constraints: the importance degree...

    Provided By University of Paris

  • White Papers // Dec 2010

    Why Do Banks Reward Their Customers To Use Their Credit Cards?

    Using a unique administrative level dataset from a large and diverse U.S. financial institution, the authors test the impact of rewards on credit card spending and debt. Specifically, they study the impact of 1 percent cash-back reward on individuals before and during their enrollment in the program. They find that...

    Provided By University of Paris

  • White Papers // Sep 2010

    Corporate Performances And Market Selection Some Comparative Evidence

    Diverse theories of industry dynamics predict heterogeneity in production efficiency to be the driver of firms' growth, survival and industrial change, either through a direct link between efficiency and growth, or through an indirect effect via profitability's, as more productive firms can enjoy higher profit margins which, under imperfect capital...

    Provided By University of Paris

  • White Papers // Jan 2009

    Banking Market Liberalization And Bank Performance: The Role Of Entry Modes

    This paper analyzes the evolution in bank performance following the removal of legal restrictions on the entry of foreign banks in three transition economies: the Czech Republic, Hungary, and Poland. Two modes of foreign bank entry are considered: entry by Greenfield investments, and by foreign mergers and acquisitions of domestic...

    Provided By University of Paris

  • White Papers // Mar 2011

    Bargaining With Intertemporal Maximin Payoffs

    The authors present a new class of dynamic bargaining problems, called "Bargaining problems with intertemporal maximin payoffs," that may reflect sustainability problems having to encompass conflicting issues in the long-run. Each bargainer (or stake-holder) has a representative indicator, namely a function of the state and decisions, and aims at maximizing...

    Provided By University of Paris

  • White Papers // Mar 2009

    Fault-Tolerant Consensus in Unknown and Anonymous Networks

    Most of the algorithms for distributed systems consider that the number of processes in the system is known and every process has a distinct ID. However, in some networks such as in wireless sensors networks, this is not necessarily true. Additionally, such networks are typically not totally synchronous and processes...

    Provided By University of Paris

  • White Papers // Apr 2009

    Fast Dynamics in Internet Topology: Observations and First Explanations

    By focusing on what can be observed by running traceroute-like measurements at a high frequency from a single monitor to a fixed destination set, the authors show that the observed view of the topology is constantly evolving at a pace much higher than expected. Repeated measurements discover new IP addresses...

    Provided By University of Paris

  • White Papers // May 2010

    European Literature And The Ethics Of Leadership: Cyrano De Bergerac

    This paper is built on an "Organizational" reading of "Great" texts, a reading focused on the leader, considering in a implicit way that he/she is a person with specific characters, circumstances being at left the background. This method is similar to the partial criticism made by the queer critic or...

    Provided By University of Paris

  • White Papers // Apr 2010

    A WhIMS For Financial Crises

    This paper introduces a quantitative measure of financial disturbances, which captures the heterogeneity of investor horizons - from day traders to pension funds. This risk measure, called "Wavelet-heterogeneous Index of Market Shocks" (WhIMS), is based on the combination of two methods: the Wavelet Packet Sub-band Decomposition and the constrained Independent...

    Provided By University of Paris

  • White Papers // Jan 2011

    Health And Early Retirement: Evidence From French Data For Individuals

    Health status during the working life plays a major role in the retirement decision. Significant links between professional paths, retirement age and retirement conditions (disability pension, inability pension, reduced-rate pension, or full rate by age) can be highlighted by logistic models regressions and a typology of the professional careers of...

    Provided By University of Paris

  • White Papers // Jan 2011

    On the Capacity of the Channel Aware Slotted Aloha Over Rayleigh and Nakagami-M Channels

    The authors consider the channel aware slotted ALOHA protocol that has been recently proposed to improve the capacity of the traditional slotted ALOHA by using multi-user diversity. This type of diversity is commonly used in scheduling policies that allow terminals to transmit when their channel conditions are good. Here, they...

    Provided By University of Paris

  • White Papers // Apr 2011

    The Time-Free Approach to Byzantine Failure Detection in Dynamic Networks

    Modern distributed systems deployed over wireless ad-hoc networks are inherently dynamic and the issue of designing dependable services which can cope with the high dynamics of these systems is a challenge. Byzantine failure detectors provide an elegant abstraction for solving security problems; however, very few work has been proposed for...

    Provided By University of Paris

  • White Papers // May 2010

    Dynamic Power Control for Wireless Backbone Mesh Networks: a Survey

    With the tremendous growth of wireless networks into the next generation to provide better services, Wireless Mesh Networks (WMNs) have emerged to offer ubiquitous communication and seamless broadband applications. WMNs are hybrid networks composed of a mixture of static Wireless Mesh Routers (WMRs) and mobile Wireless Mesh Clients (WMCs) interconnected...

    Provided By University of Paris

  • White Papers // Jan 2012

    A note on hyper-bent functions via Dillon-like exponents

    This paper is devoted to hyper-bent functions with multiple trace terms (including binomial functions) via Dillon-like exponents. The authors show how the approach developed by Mesnager to extend the Charpin - Gong family and subsequently extended by Wang et al. fits in a much more general setting. To this end,...

    Provided By University of Paris

  • White Papers // Jan 2012

    Dickson Polynomials, Hyperelliptic Curves and Hyper-Bent Functions

    In this paper, the authors study the action of Dickson polynomials on subsets of finite fields of even characteristic related to the trace of the inverse of an element and provide an alternate proof of a not so well-known result. Such properties are then applied to the study of a...

    Provided By University of Paris

  • White Papers // Jun 2012

    Multi-Channel Broadcast Encryption

    Broadcast encryption aims at sending a content to a large arbitrary group of users at once. Currently, the most efficient schemes provide constant-size headers that encapsulate ephemeral session keys under which the payload is encrypted. However, in practice, and namely for pay-TV, providers have to send various contents to different...

    Provided By University of Paris

  • White Papers // Jun 2012

    Resistance to Pirates 2.0: A Method From Leakage Resilient Cryptography

    In the classical model of traitor tracing, one assumes that a traitor contributes its entire secret key to build a pirate decoder. However, new practical scenarios of pirate have been considered, namely Pirate Evolution Attacks at Crypto 2007 and Pirates 2.0 at Eurocrypt 2009, in which pirate decoders could be...

    Provided By University of Paris

  • White Papers // Apr 2012

    Generic Interference Processing for Wireless Networks With Any Number of Users

    In this paper, the authors investigate how to send space time codes with full diversity and low decoding complexity for Z channels using pre-coders with any number of users. They assume that they have J transmitters each with J transmit antennas and J receivers each with J receive antennas. Each...

    Provided By University of Paris

  • White Papers // Apr 2012

    Cross-Layer Loss Differentiation Algorithms to Improve TCP Performance in WLANs

    Loss Differentiation Algorithms (LDA) are currently used to determine the cause of packet losses with an aim of improving TCP performance over wireless networks. In this paper, the authors propose a cross-layer solution based on two LDA in order to classify the loss origin on an 802.11 link and then...

    Provided By University of Paris

  • White Papers // Apr 2012

    Modeling CSMA/CA in VANET

    In this paper, the authors propose a simple theoretical model to compute the maximum spatial reuse feasible in a VANET. They focus on the ad hoc mode of the IEEE 802.11p standard. Their model offers simple and closed formulae on the maximum number of simultaneous transmitters, and on the distribution...

    Provided By University of Paris

  • White Papers // Apr 2009

    An Overview of Results on Ad Hoc Network Performances Using Spatial Models

    The authors propose a short overview of models and results based on spatial models used to evaluate the performance of ad hoc networks. Locations of nodes are distributed in a two dimensional area according to a stochastic point process, which allows them to obtain the averages and distributions of different...

    Provided By University of Paris