Skip to main content

Showing 1–6 of 6 results for author: Sica, F

Searching in archive cs. Search in all archives.
.
  1. There Are No Data Like More Data- Datasets for Deep Learning in Earth Observation

    Authors: Michael Schmitt, Seyed Ali Ahmadi, Yonghao Xu, Gulsen Taskin, Ujjwal Verma, Francescopaolo Sica, Ronny Hansch

    Abstract: Carefully curated and annotated datasets are the foundation of machine learning, with particularly data-hungry deep neural networks forming the core of what is often called Artificial Intelligence (AI). Due to the massive success of deep learning applied to Earth Observation (EO) problems, the focus of the community has been largely on the development of ever-more sophisticated deep neural network… ▽ More

    Submitted 29 October, 2023; originally announced October 2023.

    Journal ref: Published in IEEE Geoscience and Remote Sensing Magazine, vol. 11, no. 3, pp. 63-97, Sept. 2023

  2. TPU as Cryptographic Accelerator

    Authors: Rabimba Karanjai, Sangwon Shin, and Wujie Xiong, Xinxin Fan, Lin Chen, Tianwei Zhang, Taeweon Suh, Weidong Shi, Veronika Kuchta, Francesco Sica, Lei Xu

    Abstract: Cryptographic schemes like Fully Homomorphic Encryption (FHE) and Zero-Knowledge Proofs (ZKPs), while offering powerful privacy-preserving capabilities, are often hindered by their computational complexity. Polynomial multiplication, a core operation in these schemes, is a major performance bottleneck. While algorithmic advancements and specialized hardware like GPUs and FPGAs have shown promise i… ▽ More

    Submitted 2 October, 2024; v1 submitted 13 July, 2023; originally announced July 2023.

    Comments: Accepted to be presented in HASP 24, as part of MICRO 2024

    ACM Class: E.3; C.0; F.2.2

  3. arXiv:2204.11502  [pdf, other

    cs.CR cs.DM

    An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO"

    Authors: A. Gorodilova, N. Tokareva, S. Agievich, I. Beterov, T. Beyne, L. Budaghyan, C. Carlet, S. Dhooghe, V. Idrisova, N. Kolomeec, A. Kutsenko, E. Malygina, N. Mouha, M. Pudovkina, F. Sica, A. Udovenko

    Abstract: Non-Stop University CRYPTO is the International Olympiad in Cryptography that was held for the eight time in 2021. Hundreds of university and school students, professionals from 33 countries worked on mathematical problems in cryptography during a week. The aim of the Olympiad is to attract attention to curious and even open scientific problems of modern cryptography. In this paper, problems and t… ▽ More

    Submitted 25 April, 2022; originally announced April 2022.

  4. arXiv:1902.00274  [pdf, other

    cs.CV

    Deep Learning Solutions for TanDEM-X-based Forest Classification

    Authors: Antonio Mazza, Francescopaolo Sica

    Abstract: In the last few years, deep learning (DL) has been successfully and massively employed in computer vision for discriminative tasks, such as image classification or object detection. This kind of problems are core to many remote sensing (RS) applications as well, though with domain-specific peculiarities. Therefore, there is a growing interest on the use of DL methods for RS tasks. Here, we conside… ▽ More

    Submitted 1 February, 2019; originally announced February 2019.

  5. arXiv:1106.5149  [pdf, ps, other

    cs.CR math.NT

    Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication

    Authors: Peter Birkner, Patrick Longa, Francesco Sica

    Abstract: The GLV method of Gallant, Lambert and Vanstone (CRYPTO 2001) computes any multiple $kP$ of a point $P$ of prime order $n$ lying on an elliptic curve with a low-degree endomorphism $Φ$ (called GLV curve) over $\mathbb{F}_p$ as [kP = k_1P + k_2Φ(P), \quad\text{with} \max{|k_1|,|k_2|}\leq C_1\sqrt n] for some explicit constant $C_1>0$. Recently, Galbraith, Lin and Scott (EUROCRYPT 2009) extended thi… ▽ More

    Submitted 16 November, 2011; v1 submitted 25 June, 2011; originally announced June 2011.

    Comments: 23 pages, 3 figures. Changes from v3: corrected typo in proof of Lemma 5

    MSC Class: 11A05; 11R04 ACM Class: G.1.0

  6. arXiv:0912.1585  [pdf, ps, other

    math.NT cs.CR math.CV

    Factoring with Hints

    Authors: Francesco Sica

    Abstract: We introduce a new deterministic factoring algorithm, which could be described in the cryptographically fashionable term of "factoring with hints": we show that, given the knowledge of the factorisations of $O(N^{1/3+ε})$ terms surrounding $N=pq$ product of two large primes, we can recover deterministically $p$ and $q$ in $O(N^{1/3+ε})$ bit operations. Although this is slower than the current best… ▽ More

    Submitted 8 August, 2017; v1 submitted 9 December, 2009; originally announced December 2009.

    Comments: 8 pages

    MSC Class: 11M06; 30J99; 94A60