3-1-1

Results: 134215



#Item
1Algebra / Mathematics / Convex geometry / Linear algebra / Convex analysis / Convex cone / Abstract interpretation / Octahedron / Polyhedron / Linear programming / Linear inequality / Convex set

Counterexample-guided Refinement of Template Polyhedra Sergiy Bogomolov12, Goran Frehse3, Mirco Giacobbe2, and Thomas A. Henzinger2 1 3

Add to Reading List

Source URL: repository.ist.ac.at

Language: English - Date: 2018-02-08 07:01:31
2Prevention / Security / Computer security / Computing / Data security / ISO/IEC 27001 / Safety / Information security / Management system / ISMS / ISO/IEC 27006 / Information security management

1.3 ISMS POLICY It is the policy of Porism to maintain an information management system designed to meet the requirements of ISO 27001:2013 in pursuit of its primary

Add to Reading List

Source URL: porism.com

Language: English - Date: 2018-08-16 07:40:11
3

Plasma 1. What’s wrong? 2. What’s happening now? 3. Plasmafication!

Add to Reading List

Source URL: edcon.io

- Date: 2018-10-16 07:02:08
    4Music / Human voice / Extended techniques / Multiphonic / Lore Lixenberg / Overtone / Yodeling

    PRÊT A CHANTER: THE RULES §1 No speaking. Only vocalisations other than speaking are allowed——————§2 The number TWO is not allowed—————— §3 In this opera, speaking is considered

    Add to Reading List

    Source URL: www.odrathek.org

    Language: English - Date: 2018-04-28 05:19:47
    5Computer architecture / Cryptography / Computing / NIST hash function competition / Instruction set architectures / Cryptographic hash functions / Assembly languages / Grstl / ARM architecture / SHA-2 / 64-bit computing / Addressing mode

    SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2013-02-27 00:13:54
    6Mathematics / Theoretical computer science / Mathematical logic / Formal languages / Order theory / Logic in computer science / Multiset / Path ordering / Term / Structure / Rewriting / Model theory

    FBTCAn Intermediate Language for the Simulation of Biological Systems 1 Roberto Barbuti,2 Giulio Caravagna,3 Andrea Maggiolo–Schettini4 and Paolo Milazzo5

    Add to Reading List

    Source URL: pages.di.unipi.it

    Language: English - Date: 2015-12-18 06:55:14
    7Cryptography / Data Encryption Standard / Feistel cipher / Block cipher / Tiny Encryption Algorithm / ICE / Format-preserving encryption / Skipjack

    Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:34
    8Cryptography / Multivariate cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / Circulant matrix / RSA / Elliptic Curve Digital Signature Algorithm / QUAD

    Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems Bo-Yin Yang1, , Chen-Mou Cheng2 , Bor-Rong Chen2 , and Jiun-Ming Chen3 1 3

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2011-03-20 04:03:40
    9Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

    Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2012-04-04 23:26:12
    UPDATE