Daniel

Results: 24996



#Item
21Mathematical logic / Metalogic / Logic / Proof theory / X0 / First-order logic / Leitsch / Sequent calculus

System Feature Description: Importing Refutations into the GAPT Framework PxTP Workshop, Manchester Cvetan Dunchev, Alexander Leitsch, Tomer Libal, Martin Riener, Mikheil Rukhaia, Daniel Weller and Bruno Woltzenlogel-Pal

Add to Reading List

Source URL: www.logic.at

Language: English - Date: 2012-07-25 07:17:52
22Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-03-27 10:44:26
23Abstract algebra / Algebra / Mathematics / Algebraic topology / Algebraic geometry / Category theory / Sheaf / Nerve / Fundamental group / Universal property / Homological algebra / Algebraic geometry and analytic geometry

FINITE DECOMPOSITION COMPLEXITY AND THE INTEGRAL NOVIKOV CONJECTURE FOR HIGHER ALGEBRAIC K–THEORY (DRAFT) DANIEL A. RAMRAS, ROMAIN TESSERA, AND GUOLIANG YU Abstract. Decomposition complexity for metric spaces was recen

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2011-10-25 03:50:08
24Computer security / Computer hardware / Side-channel attacks / X86 architecture / Computing / Meltdown / Computer engineering / Pwnie Awards

Meltdown Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6 , Yuval Yarom

Add to Reading List

Source URL: mlq.me

Language: English - Date: 2018-08-17 12:03:32
25Cardiac electrophysiology / Medical devices / Neuroprosthetics / Medicine / Technology / Computing / Cybernetics / Implantable cardioverter-defibrillator / International Statistical Classification of Diseases and Related Health Problems / Universal Software Radio Peripheral / Artificial cardiac pacemaker / Radio-frequency identification

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin† Thomas S. Heydt-Benjamin†

Add to Reading List

Source URL: www.secure-medicine.org

Language: English - Date: 2017-10-06 05:31:23
26Cache / Computer architecture / Latency

RobinHood: Tail Latency-Aware Caching Dynamically Reallocating from Cache-Rich to Cache-Poor Daniel S. Berger (CMU) Joint work with: Benjamin Berg (CMU), Timothy Zhu (PennState), Siddhartha Sen (Microsoft Research), Mor

Add to Reading List

Source URL: platformlab.stanford.edu

Language: English - Date: 2018-10-15 19:25:55
27Cryptography / Computing / Internet / Internet protocols / Public-key cryptography / Transport Layer Security / Secure communication / Cryptographic protocols / QUIC / Transmission Control Protocol / Forward secrecy

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

Add to Reading List

Source URL: david.derler.info

Language: English - Date: 2018-10-15 14:18:42
28Computer programming / Software engineering / Type theory / Declarative programming / Functional programming / Adjoint functors / Monad / HindleyMilner type system / Variety / Redblack tree / List

A Coq Library For Internal Verification of Running-Times Jay McCarthy1 , Burke Fetscher2 , Max New2 , Daniel Feltey2 , and Robert Bruce Findler2 1

Add to Reading List

Source URL: www.ece.northwestern.edu

Language: English - Date: 2015-12-21 08:20:24
29Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-07-09 00:19:47
30Cryptocurrencies / Alternative currencies / Economy / Exonumia / Numismatics / Bitcoin / Digital currencies / Blockchains / Zerocoin protocol / Cryptocurrency tumbler / CoinJoin / CryptoNote

review articles When it comes to anonymizing cryptocurrencies, one size most definitely does not fit all. BY DANIEL GENKIN, DIMITRIOS PAPADOPOULOS, AND CHARALAMPOS PAPAMANTHOU

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2018-08-09 15:57:46
UPDATE