Chase

Results: 4088



#Item
1Mathematics / Algebra / Linear programming / Linear algebra / Elementary algebra / Inequality / Linear inequality / Expected value / Simplex algorithm / Boolean satisfiability problem / Cutting-plane method / Equation solving

Noname manuscript No. (will be inserted by the editor) Cutting to the Chase Solving Linear Integer Arithmetic

Add to Reading List

Source URL: csl.sri.com

Language: English - Date: 2014-06-27 12:47:14
2Algebra / Abstract algebra / Lie groups / Non-associative algebras / XTR / Mutation / Spectral theory

Full version of an extended abstract published in AsiacryptD´ej`a Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions Melissa Chase Microsoft Research Redmond

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
3Mathematics / Abstract algebra / Algebra / Cryptography / Digital signature / Model theory / Parity of a permutation / Proof of knowledge / Semigroup action

Malleable Signatures: New Definitions and Delegatable Anonymous Credentials Melissa Chase Markulf Kohlweiss

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
4Cryptography / Computational complexity theory / Proof of knowledge / Zero-knowledge proof / FiatShamir heuristic / Malleability / Applied mathematics

Succinct Malleable NIZKs and an Application to Compact Shuffles Melissa Chase Microsoft Research Redmond Markulf Kohlweiss

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
5

Verifiable Elections That Scale for Free Melissa Chase (MSR Redmond) Markulf Kohlweiss (MSR Cambridge) Anna Lysyanskaya (Brown University) Sarah Meiklejohn (UC San Diego)

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
    6Cryptography / Public-key cryptography / Pairing-based cryptography / Elliptic curve cryptography / Pairing / IBE

    Déjà Q: Using Dual Systems to Revisit q-Type Assumptions Melissa Chase (MSR Redmond) Sarah Meiklejohn (UC San Diego → University College London)

    Add to Reading List

    Source URL: smeiklej.com

    Language: English - Date: 2018-10-23 14:58:02
    7Cryptography / Public key infrastructure / Transport Layer Security / Cryptocurrencies / Bitcoin / Alternative currencies / Certificate Transparency / Peer-to-peer / Certificate authority

    Full version of an extended abstract published in ACM CCSTransparency Overlays and Applications Melissa Chase Microsoft Research Redmond

    Add to Reading List

    Source URL: smeiklej.com

    Language: English - Date: 2018-10-23 14:58:02
    8

    Transparency Overlays and Applications Melissa Chase (Microsoft Research Redmond) Sarah Meiklejohn (University College London) (icons by parkjisun from noun project)

    Add to Reading List

    Source URL: smeiklej.com

    - Date: 2018-10-23 14:58:02
      9Inter-process communication / Fault-tolerant computer systems / Computer architecture / Decentralization / Distributed computing / Computing / Message passing / Consensus / Actor model / Computer network / Leader election / Virtual synchrony

      Distributed Systems, Failures, and Consensus Jeff Chase Duke University The Players

      Add to Reading List

      Source URL: www2.cs.duke.edu

      Language: English - Date: 2007-12-10 15:05:26
      10Cryptography / Computer security / Identity management / Computational complexity theory / Proof of knowledge / Zero-knowledge proof / Credential / Message authentication code / NP / IP / Authentication

      This is the full version of an extended abstract published in ACM CCSPosted as Reporton 19 August 2013; revised 8 SeptemberAlgebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase

      Add to Reading List

      Source URL: smeiklej.com

      Language: English - Date: 2018-10-23 14:58:02
      UPDATE