×

Found 675 Documents (Results 1–100)

100
MathJax

On forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computer. (English) Zbl 07542379

Longa, Patrick (ed.) et al., Progress in cryptology – LATINCRYPT 2021. 7th international conference on cryptology and information security in Latin America, Bogotá, Colombia, October 6–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12912, 44-63 (2021).
PDF BibTeX XML Cite
Full Text: DOI

FAN: a lightweight authenticated cryptographic algorithm. (English) Zbl 07449882

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 299-325 (2021).
MSC:  68P25 94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient implementation of fast Hough transform using CPCA coprocessor. (English. Russian original) Zbl 1490.65026

Program. Comput. Softw. 47, No. 5, 335-343 (2021); translation from Programmirovanie 47, No. 5, 3-11 (2021).
MSC:  65D18 65Y10
PDF BibTeX XML Cite
Full Text: DOI

Efficient hardware implementations for elliptic curve cryptography over Curve448. (English) Zbl 07553870

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 228-247 (2020).
PDF BibTeX XML Cite
Full Text: DOI

Lightweight authenticated encryption mode suitable for threshold implementation. (English) Zbl 1492.94150

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 705-735 (2020).
MSC:  94A60 68P25 94A62
PDF BibTeX XML Cite
Full Text: DOI

The lattice-based digital signature scheme qTESLA. (English) Zbl 07314295

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 441-460 (2020).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Effective algebraic analysis approach to linear systems over Ore algebras. (English) Zbl 1453.93042

Quadrat, Alban (ed.) et al., Algebraic and symbolic computation methods in dynamical systems. Based on articles written for the invited sessions of the 5th symposium on system structure and control, IFAC, Grenoble, France, February 4–6, 2013 and of the 21st international symposium on mathematical theory of networks and systems (MTNS 2014), Groningen, the Netherlands, July 7–11, 2014. Cham: Springer. Adv. Delays Dyn. 9, 3-52 (2020).
MSC:  93B25 93C05
PDF BibTeX XML Cite
Full Text: DOI Link

FACE-LIGHT: fast AES-CTR mode encryption for low-end microcontrollers. (English) Zbl 1446.68064

Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 102-114 (2020).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Implementation of memory centric scheduling for COTS multi-core real-time systems. (English) Zbl 07559341

Quinton, Sophie (ed.), 31st Euromicro conference on real-time systems, ECRTS 2019, Stuttgart, Germany, July 9–12, 2019. Proceedings. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 133, Article 7, 23 p. (2019).
MSC:  68M20
PDF BibTeX XML Cite
Full Text: DOI

The PACE 2018 parameterized algorithms and computational experiments challenge: the third iteration. (English) Zbl 07378612

Paul, Christophe (ed.) et al., 13th international symposium on parameterized and exact computation, IPEC 2018, August 22–24, 2018, Helsinki, Finland. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 115, Article 26, 15 p. (2019).
MSC:  68Q25 68Wxx
PDF BibTeX XML Cite
Full Text: DOI

Simple forms and rational solutions of pseudo-linear systems. (English) Zbl 1467.34012

Bradford, Russell (ed.), Proceedings of the 44th international symposium on symbolic and algebraic computation, ISSAC ’19, Beijing, China, July 15–18, 2019. New York, NY: Association for Computing Machinery (ACM). 26-33 (2019).
MSC:  34A30 39A10 68W30
PDF BibTeX XML Cite
Full Text: DOI

The simplest multi-key linearly homomorphic signature scheme. (English) Zbl 1453.94129

Schwabe, Peter (ed.) et al., Progress in cryptology – LATINCRYPT 2019. 6th international conference on cryptology and information security in Latin America, Santiago de Chile, Chile, October 2–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11774, 280-300 (2019).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Method for implementing the arithmetic operation of addition in residue number system based on the use of the principle of circular shift. (English. Russian original) Zbl 1470.65227

Cybern. Syst. Anal. 55, No. 4, 692-698 (2019); translation from Kibern. Sist. Anal. 2019, No. 4, 194-202 (2019).
MSC:  65Y04 94A55
PDF BibTeX XML Cite
Full Text: DOI

Finite-state techniques. Automata, transducers and bimachines. (English) Zbl 1465.68006

Cambridge Tracts in Theoretical Computer Science 60. Cambridge: Cambridge University Press (ISBN 978-1-108-48541-8/hbk; 978-1-108-75694-5/ebook). x, 304 p. (2019).
PDF BibTeX XML Cite
Full Text: DOI

PDE models for atherosclerosis computer implementation in R. (English) Zbl 1409.92124

Synthesis Lectures on Mathematics and Statistics 22. San Rafael, CA: Morgan & Claypool Publishers (ISBN 978-1-68173-445-3; 978-1-68173-443-9; 978-1-68173-444-6/ebook). xii, 129 p. (2019).
PDF BibTeX XML Cite
Full Text: DOI

Accelerating integer based fully homomorphic encryption using frequency domain multiplication. (English) Zbl 1458.94241

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 161-176 (2018).
MSC:  94A60 68P25 68M99
PDF BibTeX XML Cite
Full Text: DOI

Experimental study of compressed stack algorithms in limited memory environments. (English) Zbl 07286692

D’Angelo, Gianlorenzo (ed.), 17th symposium on experimental algorithms, SEA 2018, June 27–29, 2018, L’Aquila, Italy. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 103, Article 19, 13 p. (2018).
MSC:  68P05 68U05 68W40
PDF BibTeX XML Cite
Full Text: DOI arXiv

The PACE 2017 parameterized algorithms and computational experiments challenge: the second iteration. (English) Zbl 1443.68220

Lokshtanov, Daniel (ed.) et al., 12th international symposium on parameterized and exact computation, IPEC 2017, Vienna, Austria, September 6–8, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 89, Article 30, 12 p. (2018).
MSC:  68W40 68R10
PDF BibTeX XML Cite
Full Text: DOI

Secure number theoretic transform and speed record for Ring-LWE encryption on embedded processors. (English) Zbl 06889987

Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 175-188 (2018).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Handbook of floating-point arithmetic. 2nd edition. (English) Zbl 1394.65001

Cham: Birkhäuser (ISBN 978-3-319-76525-9/hbk; 978-3-319-76526-6/ebook). xxv, 627 p. (2018).
PDF BibTeX XML Cite
Full Text: DOI

Nemo/Hecke. Computer algebra and number theory packages for the Julia programming language. (English) Zbl 1457.68325

Burr, Michael (ed.), Proceedings of the 42nd international symposium on symbolic and algebraic computation, ISSAC 2017, Kaiserslautern, Germany, July 25–28, 2017. New York, NY: Association for Computing Machinery (ACM). 157-164 (2017).
MSC:  68W30 11-04
PDF BibTeX XML Cite
Full Text: DOI arXiv

Compositional synthesis of leakage resilient programs. (English) Zbl 1444.68036

Maffei, Matteo (ed.) et al., Principles of security and trust. 6th international conference, POST 2017, held as part of the European joint conferences on theory and practice of software, ETAPS 2017, Uppsala, Sweden, April 22–29, 2017. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 10204, 277-297 (2017).
MSC:  68M25 68N99
PDF BibTeX XML Cite
Full Text: DOI arXiv

A full RNS variant of FV like somewhat homomorphic encryption schemes. (English) Zbl 1418.94029

Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 423-442 (2017).
MSC:  94A60 68M07
PDF BibTeX XML Cite
Full Text: DOI Link

A scalable and systolic architectures of Montgomery modular multiplication for public key cryptosystems based on DSPS. (English) Zbl 1448.94217

Carlet, Claude (ed.) et al., Security, privacy, and applied cryptography engineering. 6th international conference, SPACE 2016, Hyderabad, India, December 14–18, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10076, 138-156 (2016).
MSC:  94A60 68M07
PDF BibTeX XML Cite
Full Text: DOI

Enhanced digital signature using RNS digit exponent representation. (English) Zbl 1409.94900

Duquesne, Sylvain (ed.) et al., Arithmetic of finite fields. 6th international workshop, WAIFI 2016, Ghent, Belgium, July 13–15, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10064, 177-192 (2016).
MSC:  94A60 68M07
PDF BibTeX XML Cite
Full Text: DOI HAL

Accelerating homomorphic computations on rational numbers. (English) Zbl 1346.68087

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 405-423 (2016).
MSC:  68P25 68T05
PDF BibTeX XML Cite
Full Text: DOI

Another classroom example of robustness problems in planar convex hull computation. (English) Zbl 1462.65028

Kotsireas, Ilias S. (ed.) et al., Mathematical aspects of computer and information sciences. 6th international conference, MACIS 2015, Berlin, Germany, November 11–13, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9582, 446-450 (2016).
MSC:  65D18 65G50
PDF BibTeX XML Cite
Full Text: DOI

Masking large keys in hardware: a masked implementation of McEliece. (English) Zbl 1396.94067

Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 293-309 (2016).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

End-to-end design of a PUF-based privacy preserving authentication protocol. (English) Zbl 1380.94136

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 556-576 (2015).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Single base modular multiplication for efficient hardware RNS implementations of ECC. (English) Zbl 1380.68015

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 123-140 (2015).
MSC:  68M07
PDF BibTeX XML Cite
Full Text: DOI

Secure refinements of communication channels. (English) Zbl 1366.68011

Harsha, Prahladh (ed.) et al., 35th IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2015, Bangalore, India, December 16–18, 2015. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-97-2). LIPIcs – Leibniz International Proceedings in Informatics 45, 575-589 (2015).
MSC:  68M14 68M12 68P25
PDF BibTeX XML Cite
Full Text: DOI

Multiple shooting in a microsecond. (English) Zbl 1337.65055

Carraro, Thomas (ed.) et al., Multiple shooting and time domain decomposition methods. MuS-TDD, Heidelberg, Germany, May 6–8, 2013. Cham: Springer (ISBN 978-3-319-23320-8/hbk; 978-3-319-23321-5/ebook). Contributions in Mathematical and Computational Sciences 9, 183-201 (2015).
PDF BibTeX XML Cite
Full Text: DOI

Parallelized software implementation of elliptic curve scalar multiplication. (English) Zbl 1403.94075

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 445-462 (2015).
PDF BibTeX XML Cite
Full Text: DOI HAL

Algorithms for parallelizing a mathematical model of forest fires on supercomputers and theoretical estimates for the efficiency of parallel programs. (English. Russian original) Zbl 1327.68326

Cybern. Syst. Anal. 51, No. 3, 471-480 (2015); translation from Kibern. Sist. Anal. 2015, No. 3, 167-177 (2015).
MSC:  68W10 93A30
PDF BibTeX XML Cite
Full Text: DOI

Remote IP protection using timing channels. (English) Zbl 1453.68025

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, South Korea, December 3–5, 2014. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8949, 222-237 (2015).
MSC:  68M25 68M12 94A60
PDF BibTeX XML Cite
Full Text: DOI

Parallel implementations of LEA. (English) Zbl 1368.94128

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 256-274 (2014).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Optimal storage for rainbow tables. (English) Zbl 1368.94085

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 144-157 (2014).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Towards practical lattice-based public-key encryption on reconfigurable hardware. (English) Zbl 1321.94085

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 68-85 (2014).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Khudra: a new lightweight block cipher for FPGAs. (English) Zbl 1398.68140

Chakraborty, Rajat Subhra (ed.) et al., Security, privacy, and applied cryptography engineering. 4th international conference, SPACE 2014, Pune, India, October 18–22, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12059-1/pbk). Lecture Notes in Computer Science 8804, 126-145 (2014).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

One word/cycle HC-128 accelerator via state-splitting optimization. (English) Zbl 1337.94041

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 283-303 (2014).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

A pipelined multi-core MIPS machine. Hardware implementation and correctness proof. (English) Zbl 1304.68005

Lecture Notes in Computer Science 9000. Cham: Springer (ISBN 978-3-319-13905-0/pbk). xii, 352 p. (2014).
PDF BibTeX XML Cite
Full Text: DOI

Efficient network-based enforcement of data access rights. (English) Zbl 1423.68137

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8642, 236-254 (2014).
PDF BibTeX XML Cite
Full Text: DOI

Foundations of statistical algorithms. With references to R packages. (English) Zbl 1296.62010

Chapman & Hall/CRC Computer Science & Data Analysis Series. Boca Raton, FL: CRC Press (ISBN 978-1-4398-7885-9/hbk; 978-1-4398-7887-3/ebook). xxv, 473 p. (2014).
MSC:  62-01 62-04 65-01 65C60 68-01
PDF BibTeX XML Cite

3D kinetic alpha complexes and their implementation. (English) Zbl 1430.68375

Sanders, Peter (ed.) et al., Proceedings of the 15th workshop on algorithm engineering and experiments (ALENEX ’13), New Orleans, LA, USA, January 7, 2013. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM). 70-77 (2013).
MSC:  68U05 68P05 92C37
PDF BibTeX XML Cite
Full Text: DOI Link

Efficient implementation of bilinear pairings on ARM processors. (English) Zbl 1327.94049

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 149-165 (2013).
MSC:  94A60 14G50 68M07
PDF BibTeX XML Cite
Full Text: DOI Link

On the matrix approach in the complex analysis and its geometric applications. (English) Zbl 1301.30008

Kiryakova, Virginia (ed.), Complex analysis and applications ’13. Proceedings of the international conference, CAA ’13, Sofia, Bulgaria, October 31 – November 2, 2013. Dedicated to the 100th anniversary of Academician Ljubomir Iliev. Sofia: Bulgarian Academy of Sciences, Institute of Mathematics and Informatics (ISBN 978-954-8986-38-0). 100-117 (2013).
PDF BibTeX XML Cite
Full Text: Link

Scientific programming. C-language, algorithms and models in science. (English) Zbl 1283.68001

Hackensack, NJ: World Scientific (ISBN 978-981-4513-40-1/hbk; 978-981-4513-42-5/ebook). xxv, 691 p. (2013).
MSC:  68-01 68N15
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Classification

all top 3

Software