Institute of Science

Results: 36174



#Item
11Cryptography / Public-key cryptography / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Cryptographic protocol / RSA / Ciphertext indistinguishability / Encryption / Chosen-ciphertext attack / Block cipher

Four Round Secure Computation without Setup Zvika Brakerski1,? and Shai Halevi2,?? and Antigoni Polychroniadou3,? ? ? 1 Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-03-10 16:45:59
12Human behavior / World Bank / Economy / Culture / Economic indicators / Numbeo / Social information processing / College and university rankings / Quality of life / Ease of doing business index / World Development Indicators / QS World University Rankings

Where are the Best FinTech Centers? Dr. Thomas Ankenbrand, Denis Bieri, New research by the Institute of Financial Services Zug (IFZ) at Lucerne University of Applied Science

Add to Reading List

Source URL: innovation.thomsonreuters.com

Language: English - Date: 2018-10-22 06:58:50
13Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Lie groups / Ring learning with errors / Learning with errors / Lattice / Homomorphic encryption / Order / Entropy / Ring learning with errors key exchange

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets Zvika Brakerski Renen Perlman Weizmann Institute of Science∗ Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-21 15:18:19
14Technology / Computing / World Wide Web / Social media / Internet vigilantism / Internet-based activism / Cyberspace / Internet culture / Online shaming / Twitter / Tweet / Hashtag

Look Before You Shame: A Study on Shaming Activities on Twitter Rajesh Basak, Niloy Ganguly, Shamik Sural, Soumya K Ghosh Department of Computer Science & Engineering, Indian Institute of Technology Kharagpur Kharagpur,

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:23:08
15X86 architecture / X86-64 / Z3 / Computing / Computer hardware / Computer engineering

Verifying Curve25519 Software Yu-Fang Chen1 , Chang-Hong Hsu2 , Hsin-Hung Lin3 , Peter Schwabe4 , Ming-Hsien Tsai1 , Bow-Yaw Wang1 , Bo-Yin Yang1 , and Shang-Yi Yang1 ? 1 Institute of Information Science

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2014-12-08 15:41:25
16Graph theory / Computing / Resource Description Framework / Query languages / Mathematics / Discrete mathematics / SPARQL / FO / Graph / Directed graph / RDFLib

For the DISTINCT Clause of SPARQL Queries Medha Atre Dept. of Computer Science and Engineering Indian Institute of Technology, Kanpur, India

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:50:47
17Actuarial science / Evaluation / Financial risk / Risk / Safety / Disaster / United States Environmental Protection Agency / Economy

Worcester Polytechnic Institute – Social Science & Policy Studies Dept. ENV 280X: Environmental & Risk Communication Sample Syllabus Dr. Patricia Stapleton Course Description The purpose of this course is to introduce

Add to Reading List

Source URL: www.patriciastapleton.com

Language: English - Date: 2018-08-04 14:34:43
18Machine learning / Learning / Artificial intelligence / Applied mathematics / Artificial neural network / Outline of machine learning / Supervised learning / Regularization / Empirical risk minimization / Backpropagation / Poisson regression / Parametric model

Mathematics of Machine Learning: An introduction Sanjeev Arora Princeton University Computer Science Institute for Advanced Study

Add to Reading List

Source URL: eta.impa.br

Language: English - Date: 2018-07-28 17:09:48
19Cryptography / Public-key cryptography / Transport Layer Security / Cryptographic software / Secure communication / Cryptographic protocols / Mbed TLS / Cipher suite / OpenSSL / Forward secrecy / Post-quantum cryptography / HTTPS

1 Postquantum SSL/TLS for embedded systems Yun-An Chang† , Ming-Shing Chen†‡ , Jong-shian Wu† , Bo-Yin Yang‡ , of Electrical Engineering, National Taiwan University, Taiwan ‡ Institute of Information Science

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2014-12-08 15:44:41
20Computing / Network architecture / Emerging technologies / Information and communications technology / Configuration management / Software-defined networking / Ethernet / OpenFlow / Computer architecture / Access control / Computer network / Network interface controller

Control-data plane intelligence trade-off in SDN Yash Sinha, Siddharth Bhatia Birla Institute of Technology and Science, Pilani, India Abstract— With the decoupling of network control and data

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 21:01:36
UPDATE