Shi

Results: 1688



#Item
1MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 SXXBETTER POLYNOMIALS FOR GNFS SHI BAI, CYRIL BOUVIER, ALEXANDER KRUPPA, AND PAUL ZIMMERMANN

MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 SXXBETTER POLYNOMIALS FOR GNFS SHI BAI, CYRIL BOUVIER, ALEXANDER KRUPPA, AND PAUL ZIMMERMANN

Add to Reading List

Source URL: cosweb1.fau.edu

Language: English - Date: 2018-10-24 18:51:52
2IKOS: A Framework for Static Analysis based on Abstract Interpretation (Tool Paper) Guillaume Brat, Jorge A. Navas, Nija Shi, and Arnaud Venet NASA Ames Research Center, Moffett Field, CAAbstract. The RTCA standar

IKOS: A Framework for Static Analysis based on Abstract Interpretation (Tool Paper) Guillaume Brat, Jorge A. Navas, Nija Shi, and Arnaud Venet NASA Ames Research Center, Moffett Field, CAAbstract. The RTCA standar

Add to Reading List

Source URL: jorgenavas.github.io

Language: English - Date: 2018-10-25 12:43:22
3SLIM: Mmap from the Cloud to Device, and Back Jinghao Shi◦ Mingyuan Xia† Ming Wu‡ Lintao Zhang‡ Zheng Zhang‡ ◦ University of Science and Technology of China

SLIM: Mmap from the Cloud to Device, and Back Jinghao Shi◦ Mingyuan Xia† Ming Wu‡ Lintao Zhang‡ Zheng Zhang‡ ◦ University of Science and Technology of China

Add to Reading List

Source URL: apsys11.ucsd.edu

Language: English - Date: 2011-07-04 13:02:25
4Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices Shi Bai1 , Damien Stehl´e1 and Weiqiang Wen1 1

Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices Shi Bai1 , Damien Stehl´e1 and Weiqiang Wen1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-08-31 11:57:10
5Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2013-04-22 15:35:26
6On the Efficiency of Pollard’s Rho Method for Discrete Logarithms Shi Bai1 1 2

On the Efficiency of Pollard’s Rho Method for Discrete Logarithms Shi Bai1 1 2

Add to Reading List

Source URL: maths-people.anu.edu.au

Language: English - Date: 2007-10-10 03:07:41
7An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-01-22 16:26:55
8Measuring, simulating and exploiting the head concavity phenomenon in BKZ Shi Bai1 , Damien Stehl´e2 , and Weiqiang Wen2 1  2

Measuring, simulating and exploiting the head concavity phenomenon in BKZ Shi Bai1 , Damien Stehl´e2 , and Weiqiang Wen2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-09-11 03:08:31
9INITIATIVE FOR CRYPTOCURRENCIES & CONTRACTS IC3 NEWSLETTER – Q1 2017 – January 3, 2017 Happy New Year from IC3! IC3 Directors Andrew Miller, Ari Juels and Elaine Shi celebrate at the Awards Dinner for the IC3-Etherue

INITIATIVE FOR CRYPTOCURRENCIES & CONTRACTS IC3 NEWSLETTER – Q1 2017 – January 3, 2017 Happy New Year from IC3! IC3 Directors Andrew Miller, Ari Juels and Elaine Shi celebrate at the Awards Dinner for the IC3-Etherue

Add to Reading List

Source URL: www.initc3.org

Language: English - Date: 2018-10-26 02:27:33
10Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-02-25 03:26:11