<--- Back to Details
First PageDocument Content
Hypervisor / Hyper-V / VM / Virtualization / Full virtualization / Ring / ARM architecture / Hardware-assisted virtualization / X86 virtualization / System software / Software / Virtual machines
Date: 2013-07-28 00:15:38
Hypervisor
Hyper-V
VM
Virtualization
Full virtualization
Ring
ARM architecture
Hardware-assisted virtualization
X86 virtualization
System software
Software
Virtual machines

Hotchips 22: ARMv7-A Extensions

Add to Reading List

Source URL: www.hotchips.org

Download Document from Source Website

File Size: 1,28 MB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Mathematics / Commutative algebra / Lattice-based cryptography / Post-quantum cryptography / Cryptography / Field theory / Ring learning with errors / Ring learning with errors key exchange / Ring learning with errors signature

On the Ring-LWE and Polynomial-LWE Problems Miruna Rosca1,2 , Damien Stehlé1 , and Alexandre Wallet1 1 ENS de Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, INRIA, UCBL), France

DocID: 1xVxG - View Document

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista

DocID: 1xVsm - View Document

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Lie groups / Ring learning with errors / Learning with errors / Lattice / Homomorphic encryption / Order / Entropy / Ring learning with errors key exchange

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets Zvika Brakerski Renen Perlman Weizmann Institute of Science∗ Abstract

DocID: 1xUGh - View Document

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Ring learning with errors / Learning with errors / Obfuscation / Lattice

Obfuscating Conjunctions under Entropic Ring LWE∗ Zvika Brakerski† Weizmann Vinod Vaikuntanathan‡ MIT

DocID: 1xUpK - View Document

Cryptography / Public-key cryptography / Digital signature / IP / Soundness / Group signature / Post-quantum cryptography / Designated verifier signature / Computational complexity theory

Short  Accountable  Ring   Signatures Based  on  DDH Jonathan  Bootle,  Andrea  Cerulli,  Pyrros Chaidos,  Essam Ghadafi,   Jens  Groth,  and  Christophe  Petit  

DocID: 1xU3N - View Document