Peter

Results: 45375



#Item
11Aarberg

Peter Gerber Peter Gerber

Add to Reading List

Source URL: www.snb.ch

Language: English
    12

    DIE REFERIERENDEN Mark Branson Direktor FINMA Prof. Dr. Aymo Brunetti Departement Volkswirtschaftslehre Universität Bern Weiyun Gong Geschäftsführer China Construction Bank (CCB) Swiss Branch Zurich Peter Hinder CEO D

    Add to Reading List

    Source URL: www.fuw.ch

    Language: German - Date: 2018-04-20 09:48:15
      13Mathematics / Theoretical computer science / Logic / Automated theorem proving / Logic programming / Complex analysis / Logical truth / Propositional calculus / Substitution / Abstract interpretation / Unification / Term

      An Abstract Domain of Uninterpreted Functions Graeme Gange1 , Jorge A. Navas2 , Peter Schachte1 , Harald Søndergaard1 , and Peter J. Stuckey1 1 2

      Add to Reading List

      Source URL: seahorn.github.io

      Language: English - Date: 2018-08-03 20:31:21
      14Computer security / Security engineering / Prevention / Crime prevention / Cryptography / Information governance / National security / Data quality / Information science / Middleware / Mandatory access control / Database

      SAFEWEB: A Middleware for Securing Ruby-based Web Applications Petr Hosek1 , Matteo Migliavacca1 , Ioannis Papagiannis1 , David M. Eyers2 , David Evans3 , Brian Shand4 , Jean Bacon3 , and Peter Pietzuch1 1

      Add to Reading List

      Source URL: srg.doc.ic.ac.uk

      Language: English - Date: 2011-12-01 05:00:04
      15Mathematics / Abstract algebra / Mathematical analysis / Graph / Graph theory / Partial derivative / Valuation / Representation / Voltage graph / operator

      Exploiting sparsity in difference-bound matrices Graeme Gange1 , Jorge A. Navas2 , Peter Schachte1 , Harald Søndergaard1 , and Peter J. Stuckey1 1 2

      Add to Reading List

      Source URL: seahorn.github.io

      Language: English - Date: 2018-08-03 20:31:21
      16Concurrent computing / Liveness / Temporal logic / Safety property / Category theory / Computation tree logic / Morphism / Dual / Category / Natural transformation / Mathematics / Mathematical logic

      Evolving Specification Engineering Dusko Pavlovic, Peter Pepper, Doug Smith Email: {dusko,smith}@kestrel.edu, Kestrel Institute and Technische Universit¨ at Berlin

      Add to Reading List

      Source URL: www.kestrel.edu

      Language: English - Date: 2012-08-02 20:29:47
      17Emerging technologies / Quantum computing / Theoretical computer science / Quantum cryptography / Cryptography / Quantum information science / Technology / Applied mathematics / Post-quantum cryptography / Internet of things

      Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

      Add to Reading List

      Source URL: joostrijneveld.nl

      Language: English - Date: 2018-09-12 10:43:16
      18Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

      High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2011-07-09 00:19:47
      19Computing / Computer architecture / Programming language theory / Microcontrollers / Instruction set architectures / Procedural programming languages / ARM architecture / R0 / ALGOL 68 / STM32

      All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen More AES software implementations? •

      Add to Reading List

      Source URL: ko.stoffelen.nl

      Language: English - Date: 2018-02-09 07:39:37
      20Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

      Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

      Add to Reading List

      Source URL: cryptojedi.org

      Language: English - Date: 2018-10-07 06:08:08
      UPDATE