Daniel 1

Results: 2456



#Item
1Conflict-Directed Graph Coverage Daniel Schwartz-Narbonne1 , Martin Sch¨af2 , Dejan Jovanovi´c2 , Philipp R¨ ummer3 , and Thomas Wies1 1

Conflict-Directed Graph Coverage Daniel Schwartz-Narbonne1 , Martin Sch¨af2 , Dejan Jovanovi´c2 , Philipp R¨ ummer3 , and Thomas Wies1 1

Add to Reading List

Source URL: csl.sri.com

Language: English - Date: 2015-02-14 13:21:39
    2Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

    Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2017-04-23 04:47:48
    3Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

    Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-02-28 05:05:12
    4ECM on Graphics Cards Daniel J. Bernstein1 , Tien-Ren Chen2 , Chen-Mou Cheng3 , Tanja Lange4 , and Bo-Yin Yang2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    ECM on Graphics Cards Daniel J. Bernstein1 , Tien-Ren Chen2 , Chen-Mou Cheng3 , Tanja Lange4 , and Bo-Yin Yang2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2011-03-20 04:03:43
    5Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1  Graz University of Technology

    Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-03-27 10:44:26
    6A Coq Library For Internal Verification of Running-Times Jay McCarthy1 , Burke Fetscher2 , Max New2 , Daniel Feltey2 , and Robert Bruce Findler2 1

    A Coq Library For Internal Verification of Running-Times Jay McCarthy1 , Burke Fetscher2 , Max New2 , Daniel Feltey2 , and Robert Bruce Findler2 1

    Add to Reading List

    Source URL: www.ece.northwestern.edu

    Language: English - Date: 2015-12-21 08:20:24
    7High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2011-07-09 00:19:47
    8Proving Non-termination Using Max-SMT? Daniel Larraz1 , Kaustubh Nimkar2 , Albert Oliveras1 , Enric Rodr´ıguez-Carbonell1 , and Albert Rubio1 1  Universitat Polit`ecnica de Catalunya, Barcelona

    Proving Non-termination Using Max-SMT? Daniel Larraz1 , Kaustubh Nimkar2 , Albert Oliveras1 , Enric Rodr´ıguez-Carbonell1 , and Albert Rubio1 1 Universitat Polit`ecnica de Catalunya, Barcelona

    Add to Reading List

    Source URL: www.lsi.upc.edu

    Language: English - Date: 2015-03-02 09:06:39
    9Second International Competition on Runtime Verification CRV 2015 Yli`es Falcone1 , Dejan Nickovic2 , Giles Reger3 , and Daniel Thoma4 1

    Second International Competition on Runtime Verification CRV 2015 Yli`es Falcone1 , Dejan Nickovic2 , Giles Reger3 , and Daniel Thoma4 1

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2016-07-20 13:08:19
    10Learning to Decipher the Heap for Program Verification  Marc Brockschmidt1 , Yuxin Chen2 , Byron Cook3 , Pushmeet Kohli1 , Daniel Tarlow1 1 Microsoft Research 2 ETH Zurich 3 University College London

    Learning to Decipher the Heap for Program Verification Marc Brockschmidt1 , Yuxin Chen2 , Byron Cook3 , Pushmeet Kohli1 , Daniel Tarlow1 1 Microsoft Research 2 ETH Zurich 3 University College London

    Add to Reading List

    Source URL: www.cs.toronto.edu

    Language: English - Date: 2016-06-04 11:31:07