Computation

Results: 6765



#Item
11Logic / Mathematical logic / Mathematics / Model theory / Propositional calculus / Logic in computer science / Logical truth / Linear temporal logic / First-order logic / Well-formed formula / Interpretation / Intuitionistic logic

Automated Deduction for Verification Natarajan Shankar SRI International Automated deduction uses computation to perform symbolic logical reasoning. It has been a core technology for program verification from the very be

Add to Reading List

Source URL: dream.inf.ed.ac.uk

Language: English - Date: 2010-07-20 03:24:48
12Cryptography / Public-key cryptography / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Cryptographic protocol / RSA / Ciphertext indistinguishability / Encryption / Chosen-ciphertext attack / Block cipher

Four Round Secure Computation without Setup Zvika Brakerski1,? and Shai Halevi2,?? and Antigoni Polychroniadou3,? ? ? 1 Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-03-10 16:45:59
13Software engineering / Computing / Computer programming / Functional programming / Evaluation strategy / Programming paradigms / Computer architecture / Functional reactive programming / Models of computation / Dataflow / Arrow / Reactive programming

Abstract The Theory and Practice of Causal Commutative Arrows Hai Liu 2011 Arrows are a popular form of abstract computation. Being more general than

Add to Reading List

Source URL: thev.net

Language: English - Date: 2014-02-12 14:21:02
14Algebra / Mathematics / Linear algebra / Rank / QR decomposition / Matrix / Determinant

MATHEMATICS OF COMPUTATION Volume 81, Number 279, July 2012, Pages 1487–1511 SArticle electronically published on February 17, 2012 PERTURBATION ANALYSIS OF THE QR FACTOR R

Add to Reading List

Source URL: perso.ens-lyon.fr

Language: English - Date: 2017-06-27 04:39:37
15Computational complexity theory / Theory of computation / IP / Proof of knowledge / NP / Zero-knowledge proof / Certificate / Theoretical computer science / Applied mathematics

Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby⋆ , Srinath Setty† , Zuocheng Ren† , Andrew J. Blumberg† , and Michael Walfish⋆ ⋆ †

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2014-12-14 14:47:16
16Cryptocurrencies / Cryptography / Computing / Blockchains / Information / Alternative currencies / Decentralization / Transaction processing / Bitcoin / Ethereum / Secure multi-party computation / Smart contract

Zexe: Enabling Decentralized Private Computation Sean Bowe Alessandro Chiesa Matthew Green

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-10-08 23:34:55
17Computer architecture / Parallel computing / Mathematics / Algebra / Projective geometry / Instruction set architectures / Vector processor / Projective space / ARM architecture / Module / Vector space / MIMD

A Projective Geometry Architecture for Scientific Computation Bharadwaj S . Amrutur Rajeev Joshi Narendra K. Karmarkar

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 20:40:57
18

Session A1: Multi-Party Computation 1 CCS’17, October 30-November 3, 2017, Dallas, TX, USA Global-Scale Secure Multiparty Computation Xiao Wang

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
    19Computational complexity theory / Logic / Mathematics / Randomized algorithms / Automated theorem proving / Logic programming / Probabilistically checkable proof / IP / NP / Substitution / MAX-3SAT / operator

    Resolving the conflict between generality and plausibility in verified computation Srinath Setty? , Benjamin Braun? , Victor Vu? , Andrew J. Blumberg? , Bryan Parno† , and Michael Walfish? ? The University of Texas at

    Add to Reading List

    Source URL: www.pepper-project.org

    Language: English - Date: 2017-11-11 14:59:54
    20Cryptographic protocols / Mathematics / Secure multi-party computation / Linear algebra / Valuation / Linear combination / Finite field

    Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2015-06-09 02:13:24
    UPDATE