and Applications

Results: 31669



#Item
21Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Block cipher / CBC-MAC / Keystream / One-key MAC / Block size / Galois/Counter Mode / XXTEA

The Missing Difference Problem, and its Applications to Counter Mode Encryption? Ga¨etan Leurent and Ferdinand Sibleyras Inria, France {gaetan.leurent,ferdinand.sibleyras}@inria.fr

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
22Economy / Business / International trade / United States Commercial Service / Export / Taipei World Trade Center / Online shopping / Small business / Southern United States Trade Association / Food Export Association of the Midwest USA

INSTRUCTIONS COMPLETE FORMS ARE REQUIRED This application and associated forms must be completed in their entirety to be considered eligible. Required questions are marked with a red asterisk. Incomplete applications

Add to Reading List

Source URL: www.wyomingbusiness.org

Language: English - Date: 2017-12-21 13:37:51
23Cryptography / Common reference string model / Non-interactive zero-knowledge proof / Cryptocurrencies / Private currencies / Zero-knowledge proof / Snark / Standard model / Compagnies Rpublicaines de Scurit / IP / Commercial Resupply Services / CRS-1

Updatable and Universal Common Reference Strings with Applications to zk-SNARKs Jens Groth1? and Markulf Kohlweiss23 and Mary Maller12?? and Sarah Meiklejohn1? ? ? and Ian Miers24† 1

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
24Network architecture / Computing / Computer architecture / Network protocols / Internet architecture / Computer networking / Internet protocols / Multiprotocol Label Switching / Software-defined networking / MPLS local protection / Automatically switched optical network / OpenFlow

SDN Use Cases for Service Provider Networks Evolving to an SDN-Enabled ISP Backbone: Key Technologies and Applications Martin Birk, Gagan Choudhury, Bruce Cortez, Alvin Goddard, Narayan Padi, Aswatnarayan Raghuram, Kath

Add to Reading List

Source URL: www.research.att.com

Language: English - Date: 2018-10-24 08:56:51
25Quantum mechanics / Physics / Theoretical computer science / Quantum information science / Cryptography / Quantum measurement / Statistical randomness / Information theory / Randomness extractor / Randomness / Random number generation / Pseudorandomness

Lecture 15, Thurs March 9: Einstein-Certified Randomness Until recently, the Bell inequality was taught because it was historically and conceptually important, not because it had any practical applications. Sure, it esta

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-08-27 05:42:19
26Cryptocurrencies / Blockchains / Concurrent computing / Decentralization / Computing / Distributed computing / Alternative currencies / Ethereum / Non-fungible token / Smart contract / Decentralized application / CryptoKitties

Cocos BlockChain Expedition A Development and Operating Environment for Decentralized Gaming Applications and Digital Assets Sep 2018 H. Chen, K. Yin, R. Yang

Add to Reading List

Source URL: www.cocosbcx.io

Language: English - Date: 2018-09-24 09:31:37
27Identity management / Cryptography / Computer security / Identity / Federated identity / Computer access control / Zero-knowledge proof / Credential / Cryptographic protocol / NP / Credit card / Digital identity

ZKProof Standards Applications Track Proceedings 1 August 2018 + subsequent revisions This document is an ongoing work in progress. Feedback and contributions are encouraged. Track Chairs:

Add to Reading List

Source URL: zkproof.org

Language: English - Date: 2018-10-25 10:32:39
28Formal languages / Language / Culture / Grammar / Context-free grammar / Formal grammar / Context-free language / Regular language / Regular grammar / Model checking / Conjunctive grammar

A Tool for Intersecting Context-Free Grammars and Its Applications Graeme Gange1 , Jorge A. Navas2(B) , Peter Schachte1 , Harald Søndergaard1 , and Peter J. Stuckey1 1 2

Add to Reading List

Source URL: jorgenavas.github.io

Language: English - Date: 2018-10-25 12:43:22
29Cryptography / Public-key cryptography / Transport Layer Security / Cross-platform software / Internet protocols / Cryptographic protocols / Private information retrieval / XMPP / Forward secrecy / HTTPS / Email / WHOIS

Proceedings on Privacy Enhancing Technologies 2015; ):4–24 Nikita Borisov*, George Danezis*, and Ian Goldberg* DP5: A Private Presence Service Abstract: Users of social applications like to be notified

Add to Reading List

Source URL: www.degruyter.com

Language: English
30Algebra / Abstract algebra / Geometry / Algebraic geometry / Algebraic surfaces / Hodge theory / Analytic number theory / Projective variety / Hodge structure / Elliptic curve / Shimura variety / Algebraic geometry and analytic geometry

Proc. Int. Cong. of Math. – 2018 Rio de Janeiro, Vol–452) FUNCTIONAL TRANSCENDENCE AND ARITHMETIC APPLICATIONS Jacob Tsimerman

Add to Reading List

Source URL: eta.impa.br

Language: English - Date: 2018-07-25 13:17:43
UPDATE