History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 86 total

Lucky microseconds: a timing attack on Amazon’s s2n implementation of TLS. (English)
Fischlin, Marc (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8‒12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 622-643 (2016).
WorldCat.org
1
Polly cracker, revisited. (English)
Des. Codes Cryptography 79, No. 2, 261-302 (2016).
WorldCat.org
2
Multilinear maps from obfuscation. (English)
Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10‒13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 446-473 (2016).
WorldCat.org
3
Towards the Design of a Persuasive Technology for Encouraging Collaborative Prototyping. (English)
PPT@PERSUASIVE, 126-131(2016)
WorldCat.org
4
Agent-based prevention of voltage collapse in electrical transmission systems. (English)
PSCC, 1-7(2016)
WorldCat.org
5
CytoGEDEVO - global alignment of biological networks with Cytoscape. (English)
Bioinformatics 32, N0. 8, 1259-1261(2016)
WorldCat.org
6
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes. (English)
CRYPTO (1), 153-178(2016)
WorldCat.org
7
Algebraic algorithms for LWE problems. (English)
ACM Commun. Comput. Algebra 49, No. 2, 62 (2015).
WorldCat.org
8
Implementing candidate graded encoding schemes from ideal lattices. (English)
Iwata, Tetsu (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 ‒ December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 752-775 (2015).
WorldCat.org
9
On the concrete hardness of learning with errors. (English)
J. Math. Cryptol. 9, No. 3, 169-203 (2015).
WorldCat.org
10
Ciphers for MPC and FHE. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 430-454 (2015).
WorldCat.org
11
On the complexity of the BKW algorithm on LWE. (English)
Des. Codes Cryptography 74, No. 2, 325-354 (2015).
WorldCat.org
12
Automatische Detektion von Okklusionen zerebraler Arterien in 3D-Magnetresonanzangiographiedaten. (English)
Bildverarbeitung für die Medizin, 17-22(2015)
WorldCat.org
13
Donor Selection for Hematopoietic Stem Cell Transplant Using Cost-Sensitive SVM. (English)
ICMLA, 831-836(2015)
WorldCat.org
14
Coordinating decentralized linear programs by exchange of primal information. (English)
European Journal of Operational Research 247, N0. 3, 788-796(2015)
WorldCat.org
15
Outage based power allocation for a lossy forwarding two-relaying system. (English)
CAMAD, 267-272(2015)
WorldCat.org
16
Improved source correlation estimation in wireless sensor networks. (English)
ICC Workshops, 2121-2126(2015)
WorldCat.org
17
On the efficacy of solving LWE by reduction to unique-SVP. (English)
Lee, Hyang-Sook (ed.) et al., Information security and cryptology ‒ ICISC 2013. 16th international conference, Seoul, Korea, November 27‒29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 293-310 (2014).
WorldCat.org
18
Determining near optimal base-stock levels in two-stage general inventory systems. (English)
Eur. J. Oper. Res. 232, No. 2, 342-349 (2014).
WorldCat.org
19
Block ciphers ‒ focus on the linear layer (feat. PRIDE). (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 57-76 (2014).
WorldCat.org
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 86 total

Valid XHTML 1.0 Transitional Valid CSS!