Yuval

Results: 343



#Item
21

Boolean function analysis on high-dimensional expanders Irit Dinur∗ Yuval Filmus† Prahladh Harsha‡

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2018-04-21 15:28:51
    22

    Total variation cutoff in a tree Yuval Peres∗ Perla Sousi† July 10, 2013

    Add to Reading List

    Source URL: www.statslab.cam.ac.uk

    Language: English - Date: 2013-07-10 16:51:03
      23

      Twenty (Simple) Questions Yuval Dagan Yuval Filmus Technion — Israel Institute of Technology

      Add to Reading List

      Source URL: www.cs.toronto.edu

      Language: English - Date: 2017-05-10 02:40:38
        24

        Statistical Randomized Encodings: A Complexity Theoretic View Shweta Agrawal ? , Yuval Ishai ?? , Dakshita Khurana Paskin-Cherniavsky † ???

        Add to Reading List

        Source URL: web.cs.ucla.edu

        Language: English - Date: 2015-06-26 17:56:19
          25

          Ahlswede–Khachatrian theorem Yuval Filmus 2013 Abstract The Erd˝ os–Ko–Rado theorem determines the largest µp -measure of

          Add to Reading List

          Source URL: www.cs.toronto.edu

          Language: English - Date: 2014-03-30 15:00:43
            26

            Flash Parameter Injection A SECURITY ADVISORY A whitepaper from IBM Rational Application Security Team Yuval Baror Ayal Yogev Adi Sharabani

            Add to Reading List

            Source URL: blog.watchfire.com

            Language: English - Date: 2008-10-02 08:51:13
              27Computer architecture / Computing / Computer hardware / Central processing unit / X86 architecture / Computer memory / Virtual memory / Side-channel attacks / Translation lookaside buffer / CPU cache / Meltdown / Spectre

              Meltdown Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Stefan Mangard1 , Paul Kocher3 , Daniel Genkin4 , Yuval Yarom5 , Mike Hamburg6 1 Graz University of Technology 2 Cyberus Techno

              Add to Reading List

              Source URL: meltdownattack.com

              Language: English - Date: 2018-01-03 16:52:25
              28Circuit complexity / Theoretical computer science / Complexity classes / Electrical engineering / Cryptographic protocols / Secure multi-party computation / Computational complexity theory / Digital circuits / Computer science / NC / CC / Boolean circuit

              How to Construct a Leakage-Resilient (Stateless) Trusted Party Daniel Genkin Yuval Ishai Mor Weiss

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2017-12-04 14:17:17
              29

              Subexponential AC0-Frege Simulates Frege Yuval Filmus1 Toniann Pitassi1 Rahul Santhanam2 1 2

              Add to Reading List

              Source URL: www.cs.toronto.edu

              Language: English - Date: 2011-06-25 19:52:36
                30

                Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography Vipul Goyal∗ Yuval Ishai† Mohammad Mahmoody‡ Amit Sahai§ February 18, 2010 Abstract

                Add to Reading List

                Source URL: www.cs.virginia.edu

                Language: English - Date: 2013-09-26 12:37:24
                  UPDATE