Daniel 1

Results: 2456



#Item
1

Conflict-Directed Graph Coverage Daniel Schwartz-Narbonne1 , Martin Sch¨af2 , Dejan Jovanovi´c2 , Philipp R¨ ummer3 , and Thomas Wies1 1

Add to Reading List

Source URL: csl.sri.com

Language: English - Date: 2015-02-14 13:21:39
    2Aircraft instruments / Aviation / Avionics / Technology / Electronics / ACARS / ARINC / VHF Data Link / SATCOM / Data link / Pilot report / Flight plan

    Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2017-04-23 04:47:48
    3Cryptography / Public-key cryptography / Elliptic curve cryptography / Digital Signature Standard / Key management / Elliptic Curve Digital Signature Algorithm / Digital signature / Digital Signature Algorithm / EdDSA / Key / Domain Name System Security Extensions / Homomorphic encryption

    Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-02-28 05:05:12
    4Video cards / Computer architecture / Computing / Graphics hardware / CUDA / GeForce / Graphics processing unit / Nvidia / GeForce 500 series / GeForce 400 series

    ECM on Graphics Cards Daniel J. Bernstein1 , Tien-Ren Chen2 , Chen-Mou Cheng3 , Tanja Lange4 , and Bo-Yin Yang2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2011-03-20 04:03:43
    5Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security

    Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-03-27 10:44:26
    6Computer programming / Software engineering / Type theory / Declarative programming / Functional programming / Adjoint functors / Monad / HindleyMilner type system / Variety / Redblack tree / List

    A Coq Library For Internal Verification of Running-Times Jay McCarthy1 , Burke Fetscher2 , Max New2 , Daniel Feltey2 , and Robert Bruce Findler2 1

    Add to Reading List

    Source URL: www.ece.northwestern.edu

    Language: English - Date: 2015-12-21 08:20:24
    7Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

    High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2011-07-09 00:19:47
    8Mathematical analysis / Ergodic theory / Differential topology / Mathematics / Computability theory / Lie algebras / Non-associative algebras / Hopf decomposition / Orbifold

    Proving Non-termination Using Max-SMT? Daniel Larraz1 , Kaustubh Nimkar2 , Albert Oliveras1 , Enric Rodr´ıguez-Carbonell1 , and Albert Rubio1 1 Universitat Polit`ecnica de Catalunya, Barcelona

    Add to Reading List

    Source URL: www.lsi.upc.edu

    Language: English - Date: 2015-03-02 09:06:39
    9Computing / Cross-platform software / Logic in computer science / Runtime verification / Benchmark / Standard Performance Evaluation Corporation / Computer performance / Java

    Second International Competition on Runtime Verification CRV 2015 Yli`es Falcone1 , Dejan Nickovic2 , Giles Reger3 , and Daniel Thoma4 1

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2016-07-20 13:08:19
    10Data types / Computing / Theoretical computer science / Software engineering / Heap / Tree / Separation logic / Variable / Parse tree / Logic programming / Linked list

    Learning to Decipher the Heap for Program Verification Marc Brockschmidt1 , Yuxin Chen2 , Byron Cook3 , Pushmeet Kohli1 , Daniel Tarlow1 1 Microsoft Research 2 ETH Zurich 3 University College London

    Add to Reading List

    Source URL: www.cs.toronto.edu

    Language: English - Date: 2016-06-04 11:31:07
    UPDATE