1![-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt -Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt](https://www.pdfsearch.io/img/a8216c1d38b57ce5d7a9c15248f5e68e.jpg) | Add to Reading ListSource URL: precision.moscito.orgLanguage: English - Date: 2011-03-20 04:03:42
|
---|
2![Machine Learning @ Amazon Rajeev Rastogi Director, Machine Learning
Key Takeaways • Machine Learning @ Amazon Rajeev Rastogi Director, Machine Learning
Key Takeaways •](https://www.pdfsearch.io/img/1c0f17161d293e33fbdc09e60fd6a937.jpg) | Add to Reading ListSource URL: www.cikmconference.orgLanguage: English - Date: 2018-05-10 16:33:53
|
---|
3![Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3 Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3](https://www.pdfsearch.io/img/888ab6bdbdddef265e1c7cc25cb4d848.jpg) | Add to Reading ListSource URL: precision.moscito.orgLanguage: English - Date: 2012-04-04 23:26:12
|
---|
4![ESS Token Utility and Functions There are a number of key functions that ESS will enable, with additional functionality added in as the Essentia project is developed further. This will occur on an incremental basis, with ESS Token Utility and Functions There are a number of key functions that ESS will enable, with additional functionality added in as the Essentia project is developed further. This will occur on an incremental basis, with](https://www.pdfsearch.io/img/606197399529f90f78b28b19f3fd5657.jpg) | Add to Reading ListSource URL: essentia.oneLanguage: English - Date: 2018-09-04 08:00:52
|
---|
5![Voting with Their Feet: Inferring User Preferences from App Management Activities Huoran Li1 , Wei Ai2 , ‡ Xuanzhe Liu1 , Jian Tang3 , ‡ Gang Huang1 , Feng Feng4 , ‡ Qiaozhu Mei2 1 Key Lab of High-Confidence Softw Voting with Their Feet: Inferring User Preferences from App Management Activities Huoran Li1 , Wei Ai2 , ‡ Xuanzhe Liu1 , Jian Tang3 , ‡ Gang Huang1 , Feng Feng4 , ‡ Qiaozhu Mei2 1 Key Lab of High-Confidence Softw](https://www.pdfsearch.io/img/517fdb3d9e98d96888802c8cb07748f3.jpg) | Add to Reading ListSource URL: gdac.uqam.caLanguage: English - Date: 2017-10-04 01:13:59
|
---|
6![Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw](https://www.pdfsearch.io/img/2947c480543c2baacf63d98f14c77bfc.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-30 18:44:12
|
---|
7![1 Software Vulnerability Disclosure in Europe: Summary and Key Highlights of the European Parliament 1 Software Vulnerability Disclosure in Europe: Summary and Key Highlights of the European Parliament](https://www.pdfsearch.io/img/ad5edf3416e0651da29aa069a816a132.jpg) | Add to Reading ListSource URL: www.hackerone.comLanguage: English - Date: 2018-08-28 15:00:43
|
---|
8![Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6 Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6](https://www.pdfsearch.io/img/4030a09543e6a46336f98d9177af64d7.jpg) | Add to Reading ListSource URL: who.rocq.inria.frLanguage: English - Date: 2018-06-14 07:12:37
|
---|
9![Language Models for Proofs Anonymous Author(s) ABSTRACT Proofs play a key role in reasoning about programs and verification of properties of systems. Mechanized proof assistants help users in developing proofs and checki Language Models for Proofs Anonymous Author(s) ABSTRACT Proofs play a key role in reasoning about programs and verification of properties of systems. Mechanized proof assistants help users in developing proofs and checki](https://www.pdfsearch.io/img/33b65542d940979d8f893b2ef589951d.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2018-10-22 12:57:37
|
---|