Shi

Results: 1688



#Item
1Algebra / Mathematics / Polynomials / Computer algebra / Polynomial / General number field sieve / Resultant / Irreducible polynomial / Factorization / Polynomial greatest common divisor / Degree of a polynomial

MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 SXXBETTER POLYNOMIALS FOR GNFS SHI BAI, CYRIL BOUVIER, ALEXANDER KRUPPA, AND PAUL ZIMMERMANN

Add to Reading List

Source URL: cosweb1.fau.edu

Language: English - Date: 2018-10-24 18:51:52
2Software engineering / Computing / Software / Compilers / Compiler construction / Compiler optimizations / Abstract interpretation / LLVM / Programming language implementation / Intermediate representation / Polyspace / Static program analysis

IKOS: A Framework for Static Analysis based on Abstract Interpretation (Tool Paper) Guillaume Brat, Jorge A. Navas, Nija Shi, and Arnaud Venet NASA Ames Research Center, Moffett Field, CAAbstract. The RTCA standar

Add to Reading List

Source URL: jorgenavas.github.io

Language: English - Date: 2018-10-25 12:43:22
3Computing / Open formats / RSS / Computer file formats / Data types / Cloud computing / Atom / News aggregator / Pointer swizzling / Pointer / Computer data storage / Cloudlet

SLIM: Mmap from the Cloud to Device, and Back Jinghao Shi◦ Mingyuan Xia† Ming Wu‡ Lintao Zhang‡ Zheng Zhang‡ ◦ University of Science and Technology of China

Add to Reading List

Source URL: apsys11.ucsd.edu

Language: English - Date: 2011-07-04 13:02:25
4Algebra / Mathematics / Cryptography / Linear algebra / Lattice-based cryptography / Post-quantum cryptography / Lattice points / Computational hardness assumptions / Lattice / Euclidean vector / Basis / Crystal structure

Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices Shi Bai1 , Damien Stehl´e1 and Weiqiang Wen1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-08-31 11:57:10
5Computing / Information and communications technology / Computer network security / Networking hardware / Computer networking / Data transmission / Computer security / Firewall software / Middlebox / Computer appliance / Packet processing / Computer network

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2013-04-22 15:35:26
6Abstract algebra / Algebra / Mathematics / Group theory / Computational hardness assumptions / Logarithms / Modular arithmetic / Finite fields / Discrete logarithm / Randomized algorithm / Pollard's rho algorithm / Index calculus algorithm

On the Efficiency of Pollard’s Rho Method for Discrete Logarithms Shi Bai1 1 2

Add to Reading List

Source URL: maths-people.anu.edu.au

Language: English - Date: 2007-10-10 03:07:41
7Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Ring learning with errors / Learning with errors / Digital signature / Hash function / Multivariate random variable / Normal distribution / RSA / Entropy

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-01-22 16:26:55
8Cryptography / Mathematics / Algebra / Post-quantum cryptography / Lattice-based cryptography / Linear algebra / Lattice points / Lattice reduction / Lattice / Crystal structure / GramSchmidt process / Lattice problem

Measuring, simulating and exploiting the head concavity phenomenon in BKZ Shi Bai1 , Damien Stehl´e2 , and Weiqiang Wen2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-09-11 03:08:31
9Cryptocurrencies / Economy / Money / Finance / Blockchain / Ethereum / Bitcoin / CoinDesk / Smart contract / Ledger / Emin Gn Sirer / Vitalik Buterin

INITIATIVE FOR CRYPTOCURRENCIES & CONTRACTS IC3 NEWSLETTER – Q1 2017 – January 3, 2017 Happy New Year from IC3! IC3 Directors Andrew Miller, Ari Juels and Elaine Shi celebrate at the Awards Dinner for the IC3-Etherue

Add to Reading List

Source URL: www.initc3.org

Language: English - Date: 2018-10-26 02:27:33
10Mathematical analysis / Mathematics / Post-quantum cryptography / Number theory / Measure theory / Cryptography / Algebra / Distribution / Support / Learning with errors / Weight / KullbackLeibler divergence

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-02-25 03:26:11
UPDATE