Address
  • Postbus 513, MF

    5600MB Eindhoven

    Netherlands

Find us here
Filter
Conference contribution

Search results

  • 2021

    Post-Quantum WireGuard

    Hülsing, A., Ning, K., Schwabe, P., Weber, F. & Zimmermann, P. R., 1 May 2021, 2021 IEEE Symposium on Security and Privacy (S&P). Los Alamitos, CA, USA: IEEE Computer Society, p. 511-528 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2020

    Approximation Algorithms for Car-Sharing Problems

    Luo, K. & Spieksma, F. C. R., 2020, Computing and Combinatorics - 26th International Conference, COCOON 2020, Proceedings. Kim, D., Uma, R. N., Cai, Z. & Lee, D. H. (eds.). Springer, p. 262-273 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12273 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Generalized Matsui Algorithm 1 with Application for the Full DES

    Ashur, T., Posteuca, R., Šijačić, D. & D’haeseleer, S., 2020, Security and Cryptography for Networks. SCN 2020. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 448-467 20 p. (Lecture notes in computer science; vol. 12238)(Security and Cryptology; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    4 Downloads (Pure)
  • Hamiltonian Cycle Parameterized by Treedepth in Single Exponential Time and Polynomial Space

    Nederlof, J., Pilipczuk, M., Swennenhuis, C. M. F. & Wegrzycki, K., 2020, Graph-Theoretic Concepts in Computer Science: 46th International Workshop, WG 2020, Leeds, UK, June 24–26, 2020, Revised Selected Papers. Adler, I. & Müller, H. (eds.). Springer, p. 27-39 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • McTiny: Fast high-confidence post-quantum key erasure for tiny network servers

    Bernstein, D. J. & Lange, T., 2020, Proceedings of the 29th USENIX Security Symposium. Usenix Association, p. 1731-1748 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • Polytopes, lattices, and spherical codes for the nearest neighbor problem

    Laarhoven, T., 1 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 76. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Prelude to Marvellous: With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy

    Ashur, T. & Dhooghe, S., Aug 2020, The Conference for Failed Approaches and Insightful Losses in Cryptology: CFail 2020. 26 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    4 Downloads (Pure)
  • Rotational Cryptanalysis on MAC Algorithm Chaskey

    Kraleva, L., Ashur, T. & Rijmen, V., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings: ACNS 2020. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Springer, p. 153-168 16 p. ( Lecture Notes in Computer Science ; vol. 12146).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    2 Downloads (Pure)
  • Rotational-XOR Cryptanalysis of Simon-like Block Ciphers

    Lu, J., Liu, Y., Ashur, T., Sun, B. & Li, C., 2020, Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Proceedings. Liu, J. K. & Cui, H. (eds.). Springer, Vol. 12248. p. 105-124 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12248 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    2 Downloads (Pure)
  • Sieve, enumerate, slice, and lift:: Hybrid lattice algorithms for svp via cvpp

    Doulgerakis, E., Laarhoven, T. & de Weger, B., 2020, Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Proceedings. Nitaj, A. & Youssef, A. (eds.). Springer Gabler, p. 301-320 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • The angular blowing-a-kiss problem

    Struijs, M. A. C., Buchin, K. A., Kostitsyna, I. & Lambers, R., 16 Mar 2020, EuroCG 2020: Book of Abstracts, 36th European Workshop on Computational Geometry. p. 74:1-74:7 7 p. 74

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

  • The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier

    Ducas, L., Laarhoven, T. & van Woerden, W. P. J., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). Springer Gabler, p. 3-36 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • 2019

    Application of complementary dual AG codes to entanglement-assisted quantum codes

    Pereira, F. R. F., Pellikaan, R., La Guardia, G. G. & De Assis, F. M., 1 Jul 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 2559-2563 5 p. 8849685

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • A reaction attack against cryptosystems based on LRPC codes

    Samardjiska, S., Santini, P., Persichetti, E. & Banegas, G., 2019, Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Proceedings. Schwabe, P. & Thériault, N. (eds.). Cham: Springer, p. 197-216 20 p. (Lecture Notes in Computer Science; vol. 11774).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    6 Citations (Scopus)
  • DAGS: reloaded revisiting dyadic key encapsulation

    Banegas, G., Barreto, P. S. L. M., Boidje, B. O., Cayrel, P-L., Dione, G. N., Gaj, K., Gueye, C. T., Haeussler, R., Klamti, J. B., Ndiaye, O., Nguyen, D. T., Persichetti, E. & Ricardini, J. E., 2019, Code-Based Cryptography - 7th International Workshop, CBC 2019, Revised Selected Papers. Baldi, M., Santini, P. & Persichetti, E. (eds.). Cham: Springer, p. 69-85 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11666 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Decisional second-preimage resistance: when does SPR imply PRE?

    Bernstein, D. J. & Hülsing, A., 22 Nov 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Berlin: Springer, p. 33-62 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11923 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Don't forget your roots: Constant-time root finding over F 2 m

    Martins, D., Banegas, G. & Custódio, R., 2019, Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Proceedings. Schwabe, P. & Thériault, N. (eds.). Cham: Springer, p. 109-129 21 p. (Lecture Notes in Computer Science; vol. 11774).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Entanglement-assisted quantum codes from algebraic geometry codes

    Fernandes Pereira, F., Pellikaan, R., Gadioli La Guardia, G. & de Assis, F. M., 2019, Proceedings of the WCC 2019: The Eleventh International Workshop on Coding and Cryptography. 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Equal-subset-sum faster than the meet-in-the-middle

    Mucha, M., Nederlof, J., Pawlewicz, J. & Węgrzycki, K., Sep 2019, 27th Annual European Symposium on Algorithms, ESA 2019. Bender, M. A., Svensson, O. & Herman, G. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 16 p. 73. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 144).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    14 Downloads (Pure)
  • Evolutionary techniques in lattice sieving algorithms

    Laarhoven, T., 1 Jan 2019, IJCCI 2019 - Proceedings of the 11th International Joint Conference on Computational Intelligence. Merelo, J. J., Garibaldi, J., Linares-Barranco, A., Madani, K., Warwick, K. & Warwick, K. (eds.). Setúbal: SCITEPRESS-Science and Technology Publications, Lda., p. 31-39 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    2 Citations (Scopus)
    46 Downloads (Pure)
  • Faster SeaSign signatures through improved rejection sampling

    Decru, T., Panny, L. & Vercauteren, F., 14 Jul 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 271-285 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • Fast secure comparison for medium-sized integers and its application in binarized neural networks

    Abspoel, M., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 453-472 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Finding closest lattice vectors using approximate voronoi cells

    Doulgerakis, E., Laarhoven, T. & de Weger, B., 1 Jan 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • Hamiltonicity below Dirac’s condition

    Jansen, B. M. P., Kozma, L. & Nederlof, J., 12 Sep 2019, Graph-Theoretic Concepts in Computer Science - 45th International Workshop, WG 2019, Revised Papers. Sau, I. & Thilikos, D. M. (eds.). Cham: Springer, p. 27-39 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11789 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Nearest neighbor decoding for Tardos fingerprinting codes

    Laarhoven, T. M. M., 2 Jul 2019, IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. New York: Association for Computing Machinery, Inc, p. 182-187 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Nearly ETH-tight algorithms for planar Steiner Tree with terminals on few faces

    Kisfaludi-Bak, S., Nederlof, J. & van Leeuwen, E. J., 2019, Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. Chan, T. M. (ed.). New York: Association for Computing Machinery, Inc, p. 1015-1034 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    3 Citations (Scopus)
  • On a generalization of iterated and randomized rounding

    Bansal, N., 23 Jun 2019, STOC 2019 - Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. Charikar, M. & Cohen, E. (eds.). New York: Association for Computing Machinery, Inc, p. 1125-1135 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • On the discrepancy of random low degree set systems

    Bansal, N. & Meka, R., 2019, Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. Chan, T. M. (ed.). New York: Association for Computing Machinery, Inc, p. 2557-2564 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    2 Citations (Scopus)
  • On the sparsity of MRD codes

    Ravagnani, A. & Byrne, E., 2019, 11th International Workshop on Coding and Cryptography - WCC 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Quantum BCH and reed-solomon entanglement-assisted codes

    Fernandes Pereira, F. & Pellikaan, R., 2019, Proceedings of the 40th WIC Symposium on Information Theory in the Benelux . p. 102 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

    Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 Apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Cham: Springer, p. 409-441 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    15 Citations (Scopus)
    85 Downloads (Pure)
  • Quantum Indistinguishability of random sponges

    Czajkowski, J., Hülsing, A. & Schaffner, C., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Cham: Springer, p. 296-325 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Revenue maximization in an optical router node using multiple wavelengths

    Abidini, M. A., Boxma, O., Hurkens, C., Koonen, T. & Resing, J., 12 Mar 2019, Proceedings of the 12th EAI International Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS 2019. Association for Computing Machinery, Inc, p. 47-53 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Round5: compact and fast post-quantum public-key encryption

    Baan, H., Bhattacharya, S., Fluhrer, S., Garcia-Morchon, O., Laarhoven, T. M. M., Rietman, R., Saarinen, M. J. O., Tolhuizen, L. & Zhang, Z., 14 Jul 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 83-102 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
    1 Downloads (Pure)
  • The SPHINCS+ signature framework

    Bernstein, D. J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J. & Schwabe, P., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, p. 2129-2146 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    6 Citations (Scopus)
    42 Downloads (Pure)
  • Tighter proofs of CCA security in the quantum random oracle model

    Bindel, N., Hamburg, M., Hövelmanns, K., Hülsing, A. & Persichetti, E., 22 Nov 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Berlin: Springer, Vol. 2. p. 61-90 30 p. (Lecture notes in computer science; vol. 11892)(Security and cryptology; vol. 11892).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • Tiny wireguard tweak

    Appelbaum, J. R., Martindale, C. R. & Wu, S. P., 1 Jan 2019, Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Rachidi, T. & Buchmann, J. (eds.). Cham: Springer, p. 3-20 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11627 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • 2018

    A tight lower bound for counting Hamiltonian cycles via matrix rank

    Curticapean, R., Lindze, N. & Nederlof, J., 1 Jan 2018, 29th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2018. New York: Association for Computing Machinery, Inc, p. 1080-1099 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    6 Citations (Scopus)
  • Competitive algorithms for generalized k-server in uniform metrics.

    Bansal, N., Elias, M., Koumoutsos, G. & Nederlof, J., 2018, 29th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2018. Czumaj, A. (ed.). s.l.: Society for Industrial and Applied Mathematics (SIAM), p. 992-1001 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    6 Citations (Scopus)
    69 Downloads (Pure)
  • Computing the chromatic number using graph decompositions via matrix rank

    Jansen, B. M. P. & Nederlof, J., 1 Aug 2018, 26th European Symposium on Algorithms, ESA 2018. Bast, H., Herman, G. & Azar, Y. (eds.). Wadern: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 15 p. 47. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 112).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    1 Citation (Scopus)
    33 Downloads (Pure)
  • CSIDH: An efficient post-quantum commutative group action

    Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Berlin: Springer, p. 395-427 33 p. (Lecture Notes in Computer Science; vol. 11274).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    53 Citations (Scopus)
  • Graph-based time-space trade-offs for approximate near neighbors

    Laarhoven, T., 24 May 2018, 34th International Symposium on Computational Geometry, SoCG 2018. Speckmann, B. & Toth, C. (eds.). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Vol. 99. p. 1-14 57. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 99).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    2 Citations (Scopus)
    24 Downloads (Pure)
  • HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

    Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 Jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 203-216 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    10 Citations (Scopus)
    2 Downloads (Pure)
  • Improved bounds for multipass pairing heaps and path-balanced binary search trees

    Dorfman, D., Kaplan, H., Kozma, L., Pettie, S. & Zwick, U., 1 Aug 2018, 26th European Symposium on Algorithms, ESA 2018. Wadern: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 1-13 13 p. 24

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    1 Citation (Scopus)
    12 Downloads (Pure)
  • Matrix codes with the rank metric and their covering radii

    Ravagnani, A. & Byrne, E., 2018, 23rd International Symposium on Mathematical Theory of Networks and Systems - MTNS 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • More consequences of falsifying SETH and the orthogonal vectors conjecture

    Abboud, A., Dell, H., Bringmann, K. & Nederlof, J., 20 Jun 2018, STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. New York: Association for Computing Machinery, Inc, p. 253-266 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    10 Citations (Scopus)
  • Nested convex bodies are chaseable

    Bansal, N., Bohm, M., Elias, M., Koumoutsos, G. & Umboh, S. W., 2018, 29th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2018. Czumaj, A. (ed.). s.l.: Society for Industrial and Applied Mathematics (SIAM), p. 1253-1260 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    11 Citations (Scopus)
    95 Downloads (Pure)
  • Non-monochromatic and conflict-free coloring on tree spaces and planar network spaces

    Aronov, B., de Berg, M., Markovic, A. & Woeginger, G., 29 Jun 2018, Computing and Combinatorics - 24th International Conference, COCOON 2018, Proceedings. Zhu, D. & Wang, L. (eds.). Springer, p. 567-578 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10976 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Downloads (Pure)
  • On directed feedback vertex set parameterized by treewidth

    Bonamy, M., Kowalik, Ł., Nederlof, J., Pilipczuk, M., Socała, A. & Wrochna, M., 1 Jan 2018, Graph-Theoretic Concepts in Computer Science - 44th International Workshop, WG 2018, Proceedings. Brandstädt, A., Köhler, E. & Meer, K. (eds.). Springer, p. 65-78 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
  • Packing sporadic real-time tasks on identical multiprocessor systems

    Chen, J. J., Bansal, N., Chakraborty, S. & Von Der Brüggen, G., 1 Dec 2018, 29th International Symposium on Algorithms and Computation, ISAAC 2018. Hsu, W-L., Lee, D-T. & Liao, C-S. (eds.). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 14 p. 71. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 123).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    19 Downloads (Pure)