Compute!

Results: 1494



#Item
331

Revocable Timed‐Release Encryption Dominique Unruh University of Tartu Dominique Unruh

Add to Reading List

Source URL: ec14.compute.dtu.dk

Language: English - Date: 2014-05-16 06:26:28
    332

    How to Certify the Leakage of a Chip? F. Durvaux, F.-X. Standaert, N. Veyrat-Charvillon UCL Crypto Group, Belgium EUROCRYPT 2014, Copenhagen, Denmark

    Add to Reading List

    Source URL: ec14.compute.dtu.dk

    Language: English - Date: 2014-05-16 06:54:28
      333

      Singular Learning Theory Problems: Day 2 Shaowei Lin 22 MayGiven integers α1 , . . . , αd ≥ 0, compute the RLCT at the origin of the following monomial ideals: (a) hω1α1 , ω2α2 , . . . , ωdαd i (b) hω

      Add to Reading List

      Source URL: www1.i2r.a-star.edu.sg

      Language: English - Date: 2013-05-25 12:10:14
        334

        A Full Characterization of Completeness for Two-party Randomized Function Evaluation

        Add to Reading List

        Source URL: ec14.compute.dtu.dk

        Language: English - Date: 2014-05-16 07:06:08
          335

          Modern computer assisted science helps to quickly gain new insights. The LRZ Compute Cloud Ideal for Research

          Add to Reading List

          Source URL: www.lrz.de

          Language: English - Date: 2016-01-25 09:16:29
            336

            Efficient Non‐Malleable Codes and  Key‐derivations against Poly‐size  Tampering Circuits PRATYAY MUKHERJEE  (Aarhus University) Joint work with

            Add to Reading List

            Source URL: ec14.compute.dtu.dk

            Language: English - Date: 2014-05-16 06:28:51
              337

              Physics 233B (Murayama) HW #4, due Nov 5, 12:30 pm 1. Compute the decay widths Γ(H → WL+ WL− ) and Γ(H → ZL ZL ). Also compute the decay widths into unphysical Nambu–Goldstone bosons in the Rξ -gauge for 0 ≤

              Add to Reading List

              Source URL: hitoshi.berkeley.edu

                338

                To 4,000 Compute Nodes and Beyond: Network-aware Vertex Placement in Large-scale Graph Processing Systems Hani Jamjoom 100

                Add to Reading List

                Source URL: conferences.sigcomm.org

                Language: English - Date: 2013-07-12 13:33:40
                  339

                  Identity-Based Encryption Secure Against Chosen-Ciphertext Selective Opening Attack

                  Add to Reading List

                  Source URL: ec14.compute.dtu.dk

                  Language: English - Date: 2014-05-16 06:26:08
                    340

                    CERES ATBD SubsystemGrid Fluxes and Compute Spatial Averages Release 2.2 Clouds and the Earth’s Radiant Energy System (CERES) Algorithm Theoretical Basis Document

                    Add to Reading List

                    Source URL: ceres.larc.nasa.gov

                    Language: English - Date: 2008-05-07 11:09:33
                      UPDATE