Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Conference Proceeding
|
![]() |
Quantum Attacks without Superposition Queries: the Offline Simon's AlgorithmAttribution ;DOI: 10.1007/978-3-030-34578-5_20Digital Resources/Online E-Resources |
2 |
Material Type: Conference Proceeding
|
![]() |
SL-COMP: Competition of Solvers for Separation LogicDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-17502-3_8Digital Resources/Online E-Resources |
3 |
Material Type: Conference Proceeding
|
![]() |
Forkcipher: A New Primitive for Authenticated Encryption of Very Short MessagesAttribution ;DOI: 10.1007/978-3-030-34621-8_6Digital Resources/Online E-Resources |
4 |
Material Type: Conference Proceeding
|
![]() |
TOOLympics 2019: An overview of competitions in formal methodsTools and Algorithms for the Construction and Analysis of Systems, 2019, p.3 [Peer Reviewed Journal]ISBN: 3030175014 ;ISBN: 9783030175016 ;DOI: 10.1007/978-3-030-17502-3_1Full text available |
5 |
Material Type: Article
|
![]() |
Fully homomorphic SIMD operationsDesigns, codes, and cryptography, 2014-04, Vol.71 (1), p.57-81 [Peer Reviewed Journal]Springer Science+Business Media, LLC 2012 ;2015 INIST-CNRS ;ISSN: 0925-1022 ;EISSN: 1573-7586 ;DOI: 10.1007/s10623-012-9720-4Full text available |
6 |
Material Type: Article
|
![]() |
TFHE: Fast Fully Homomorphic Encryption Over the TorusJournal of cryptology, 2020-01, Vol.33 (1), p.34-91 [Peer Reviewed Journal]Attribution ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-019-09319-xDigital Resources/Online E-Resources |
7 |
Material Type: Article
|
![]() |
Physical Zero-Knowledge Proof and NP-completeness Proof of Suguru PuzzleInformation and computation, 2022-05 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0890-5401 ;EISSN: 1090-2651 ;DOI: 10.1016/j.ic.2021.104858Digital Resources/Online E-Resources |
8 |
Material Type: Conference Proceeding
|
![]() |
Divisible E-Cash from Constrained Pseudo-Random FunctionsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-34578-5_24Digital Resources/Online E-Resources |
9 |
Material Type: Conference Proceeding
|
![]() |
VerifyThis – Verification Competition with a Human FactorLecture Notes in Computer Science, 2019, Vol.11429, p.176 [Peer Reviewed Journal]ISSN: 1611-3349 ;ISSN: 0302-9743 ;ISBN: 3030175022 ;ISBN: 9783030175016 ;ISBN: 3030175014 ;ISBN: 9783030175023 ;EISSN: 1611-3349 ;DOI: 10.1007/978-3-030-17502-3_12Full text available |
10 |
Material Type: Article
|
![]() |
Maximizing a Monotone Submodular Function Subject to a Matroid ConstraintSIAM journal on computing, 2011-01, Vol.40 (6), p.1740-1766 [Peer Reviewed Journal]Copyright © 2011 Society for Industrial and Applied Mathematics ;ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/080733991Full text available |
11 |
Material Type: Conference Proceeding
|
![]() |
Verifiable Delay Functions from Supersingular Isogenies and PairingsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-34578-5_10Digital Resources/Online E-Resources |
12 |
Material Type: Article
|
![]() |
Graph Sparsification by Effective ResistancesSIAM journal on computing, 2011-01, Vol.40 (6), p.1913-1926 [Peer Reviewed Journal]Copyright © 2011 Society for Industrial and Applied Mathematics ;ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/080734029Full text available |
13 |
Material Type: Article
|
![]() |
Submodular Function Maximization via the Multilinear Relaxation and Contention Resolution SchemesSIAM journal on computing, 2014-01, Vol.43 (6), p.1831-1879 [Peer Reviewed Journal]ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/110839655Full text available |
14 |
Material Type: Article
|
![]() |
FUZZY EXTRACTORS : HOW TO GENERATE STRONG KEYS FROM BIOMETRICS AND OTHER NOISY DATASIAM journal on computing, 2008, Vol.38 (1), p.97-139 [Peer Reviewed Journal]2009 INIST-CNRS ;[Copyright] © 2008 Society for Industrial and Applied Mathematics ;ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/060651380Full text available |
15 |
Material Type: Article
|
![]() |
A Local Clustering Algorithm for Massive Graphs and Its Application to Nearly Linear Time Graph PartitioningSIAM journal on computing, 2013-01, Vol.42 (1), p.1-26 [Peer Reviewed Journal]2013, Society for Industrial and Applied Mathematics ;ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/080744888Full text available |
16 |
Material Type: Conference Proceeding
|
![]() |
An Algebraic Attack on Rank Metric Code-Based CryptosystemsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-45727-3_3Digital Resources/Online E-Resources |
17 |
Material Type: Article
|
![]() |
Universally Utility-maximizing Privacy MechanismsSIAM journal on computing, 2012-01, Vol.41 (6), p.1673-1693 [Peer Reviewed Journal]2012, Society for Industrial and Applied Mathematics ;ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/09076828XFull text available |
18 |
Material Type: Conference Proceeding
|
![]() |
Verifying Safety of Synchronous Fault-Tolerant Algorithms by Bounded Model CheckingDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-17465-1_20Digital Resources/Online E-Resources |
19 |
Material Type: Article
|
![]() |
Interval linear systems as a necessary step in fuzzy linear systemsFuzzy sets and systems, 2015-12, Vol.281, p.227-251 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0165-0114 ;EISSN: 1872-6801 ;DOI: 10.1016/j.fss.2015.03.018Digital Resources/Online E-Resources |
20 |
Material Type: Article
|
![]() |
The Convex Geometry of Linear Inverse ProblemsFoundations of computational mathematics, 2012-12, Vol.12 (6), p.805-849 [Peer Reviewed Journal]SFoCM 2012 ;COPYRIGHT 2012 Springer ;ISSN: 1615-3375 ;EISSN: 1615-3383 ;DOI: 10.1007/s10208-012-9135-7 ;CODEN: FCMOA3Full text available |