• Postbus 513, MF

    5600MB Eindhoven

    Nederland

Onderzoeksoutput

Filter
Conferentiebijdrage
2015

Approximating independent sets in sparse graphs

Bansal, N., 2015, Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'15, San Diego CA, USA, January 4-6, 2015). Philadelphia: Society for Industrial and Applied Mathematics (SIAM), blz. 1-8

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

7 Citaten (Scopus)

Bad directions in cryptographic hash functions

Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (redactie). Berlin: Springer, blz. 488-508 21 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)

Binary puzzles as an erasure decoding problem

Utomo, P. H. & Pellikaan, G. R., 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (Brussels, Belgium, May 6-7, 2015). Roland, J. & Horlin, F. (redactie). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), blz. 129-134

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
224 Downloads (Pure)

Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes

Pellikaan, G. R., Marquez-Corbella, I. & Couvreur, A., 2015, Coding Theory and Applications: 4th International Castle Meeting, Palmela Castle, Portugal, September 15-18, 2014. Pinto, R., Malonek, P. R. & Vetton, P. (redactie). Dordrecht: Springer, blz. 133-140 8 blz. (CIM Series in Mathematical Sciences ; vol. 3).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, Progress in Cryptology - LATINCRYPT 2015 (Fourth International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (redactie). Berlin: Springer, blz. 101-118 (Lecture Notes in Computer Science; vol. 9230).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

16 Citaten (Scopus)

How to manipulate curve standards: a white paper for the black hat

Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (redactie). Berlin: Springer, blz. 109-139 31 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)
3 Downloads (Pure)

Investigating SRAM PUFs in large CPUs and GPUs

Aubel, Van, P., Bernstein, D. J. & Niederhagen, R. F., 2015, Security, Privacy, and Applied Cryptography Engineering (5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015). Chakraborty, R. S., Schwabe, P. & Solworth, J. (redactie). Springer, blz. 228-247 (Lecture Notes in Computer Science; vol. 9354).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)
2 Downloads (Pure)

Kangaroos in side-channel attacks

Lange, T., Vredendaal, van, C. & Wakker, M., 2015, Smart Card Research and Advanced Applications: 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers. Joye, M. & Moradi, A. (redactie). Berlin: Springer, blz. 104-121 (Lecture Notes in Computer Science; vol. 8968).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)

Minimizing flow-time on unrelated machines

Bansal, N. & Kulkarni, J., 2015, STOC 2015 : 47th Annual ACM Symposium on the Theory of Computing, Portland OR, USA, June 14-17, 2015. Servedio, R. A. & Rubinfeld, R. (redactie). New York NY: Association for Computing Machinery, Inc, blz. 851-860

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)

Multiprocessor jobs, preemptive schedules, and one-competitive online algorithms

Sgall, J. & Woeginger, G., 2015, Approximation and Online Algorithms (12th International Workshop, WAOA 2014, Wrocław, Poland, September 11-12, 2014, Revised Selected Papers). Bampis, E. & Svensson, O. (redactie). Dordrecht: Springer, blz. 236-247 (Lecture Notes in Computer Science; vol. 8952).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

On the Lovász theta function for independent sets in sparse graphs

Bansal, N., Gupta, A. & Guruganesh, G., 2015, 47th Annual ACM Symposium on the Theory of Computing (STOC'15, Portland OR, USA, June 14-17, 2015). Servedio, R. A. & Rubinfeld, R. (redactie). New York NY: Association for Computing Machinery, Inc, blz. 193-200

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

7 Citaten (Scopus)

Optimal sequential fingerprinting: Wald vs. Tardos

Laarhoven, T. M. M., 2015, 3rd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'15, Portland OR, USA, June 17-19, 2015). New York: Association for Computing Machinery, Inc, blz. 97-107

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

PALPAS - PAssword Less PAssword synchronization

Horsch, M., Hülsing, A. T. & Buchmann, J., 16 okt 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway: Institute of Electrical and Electronics Engineers, blz. 30-39 10 blz. 7299896

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

Parallel (probable) lock-free hash sieve: a practical sieving algorithm for the SVP

Mariano, A., Bischof, C. & Laarhoven, T., 8 dec 2015, 2015 44th International Annual Conference on Parallel Processing, ICPP 2015, 1-4 September 2015, Bejing, China. Piscataway: Institute of Electrical and Electronics Engineers, blz. 590-599 10 blz. 7349614

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

17 Citaten (Scopus)

Practical and optimal LSH for angular distance

Andoni, A., Indyk, P., Laarhoven, T. M. M., Razenshteyn, I. & Schmidt, L., 7 dec 2015, Advances in Neural Information Processing Systems (NIPS, Montreal, Canada, December 7-10, 2015). Cortes, C., Lawrence, N. D., Lee, D. D., Sugiyama, M. & Garnett, R. (redactie). s.l.: Curran Associates, blz. 1225-1233 9 blz. (Advances in Neutral Information Processing Systems; vol. 28).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access

Sieving for shortest vectors in lattices using angular locality-sensitive hashing

Laarhoven, T. M. M., 2015, Advances in Cryptology - CRYPTO 2015 (35th Annual Cryptology Conference, Santa Barbara CA, USA, August 16-20, 2015), Part I. Gennaro, R. & Robshaw, M. (redactie). Berlin: Springer, blz. 3-22 (Lecture Notes in Computer Science; vol. 9215).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

40 Citaten (Scopus)

Spamming the code offset method

Vreede, de, N. & Skoric, B., 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (Brussels, Belgium, May 6-7, 2015). Roland, J. & Horlin, F. (redactie). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), blz. 162-165

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
51 Downloads (Pure)

SPHINCS : practical stateless hash-based signatures

Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2015, Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Oswald, E. & Fischlin, M. (redactie). Berlin: Springer, blz. 368-397 (Lecture Notes in Computer Science; vol. 9056).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

93 Citaten (Scopus)

Subexponential time algorithms for finding small tree and path decompositions

Bodlaender, H. L. & Nederlof, J., 2015, Algorithms - ESA 2015 (23rd Annual European Symposium, Patras, Greece, September 14-16, 2015). Bansal, N. & Finocchi, I. (redactie). Berlin: Springer, blz. 179-190 (Lecture Notes in Computer Science; vol. 9294).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)

Subset sum in the absence of concentration

Austrin, P., Kaski, P., Koivisto, M. & Nederlof, J., 2015, 32nd International Symposium on Theoretical Aspects of Computer Science (STACS 2015, München., Germany, March 4-7, 2015). Mayr, E. W. & Ollinger, N. (redactie). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 48-61 (LIPIcs: Leibniz International Proceedings in Informatics; vol. 30).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
11 Citaten (Scopus)
96 Downloads (Pure)

The coset leader and list weight enumerator

Jurrius, R. P. M. J. & Pellikaan, G. R., 2015, Topics in finite fields : 11th International Conference on Finite Fields and their Applications (Fq11, Magdeburg, Germany, July 22-26, 2013). Kyureghyan, G. M., Mullen, G. L. & Pott, A. (redactie). s.l.: American Mathematical Society, blz. 229-252 (Contemporary Mathematics Series; vol. 632).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

The simplest protocol for oblivious transfer

Chou, T. & Orlandi, C., 2015, Progress in Cryptology - LATINCRYPT 2015 : 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015. Lauter, K. & Rodríguez-Henríquez, F. (redactie). Springer, blz. 40-58 (Lecture Notes in Computer Science; vol. 9230).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

22 Citaten (Scopus)

Tight bounds for double coverage against weak adversaries

Bansal, N., Elias, M., Jez, L., Koumoutsos, G. & Pruhs, K., 2015, Approximation and Online Algorithms: 13th International Workshop, WAOA 2015, Patras, Greece, September 17-18, 2015. Revised Selected Papers. Sanità, L. & Skutella, M. (redactie). Dordrecht: Springer, blz. 47-58 (Lecture Notes in Computer Science; vol. 9499).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)

TweetNaCl : a crypto library in 100 tweets

Bernstein, D. J., van Gastel, B., Janssen, W., Lange, T., Schwabe, P. & Smetsers, S., 2015, Progress in Cryptology - LATINCRYPT 2014 (Third International Conference on Cryptology and Information Security in Latin America, Florianópolis, Brazil, September 17-19, 2014. Revised Selected Papers). Aranha, D. F. & Menezes, A. (redactie). Berlin: Springer, blz. 64-83 (Lecture Notes in Computer Science; vol. 8895).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

20 Citaten (Scopus)

Twisted Hessian curves

Bernstein, D. J., Chuengsatiansup, C., Kohel, D. & Lange, T., 2015, Progress in Cryptology - LATINCRYPT 2015 (4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (redactie). Cham: Springer, blz. 269-294 26 blz. (Lecture Notes in Computer Science; vol. 9230).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

18 Citaten (Scopus)
2014

Another look at the shoelace TSP : the case of very old shoes

Deineko, V. G. & Woeginger, G. J., 2014, Fun with Algorithms (7th International Conference, FUN 2014, Lipari Island, Sicily, Italy, July 1-3, 2014. Proceedings). Ferro, A., Luccio, F. & Widmayer, P. (redactie). Berlin: Springer, blz. 125-136 (Lecture Notes in Computer Science; vol. 8496).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)
1 Downloads (Pure)

A polynomial time attack against algebraic geometry code based public key cryptosystems

Couvreur, A., Márquez-Corbella, I. & Pellikaan, G. R., 2014, 2014 IEEE International Symposium on Information Theory (ISIT'14, Honolulu HI, USA, June 29-July 4, 2014). Piscataway: Institute of Electrical and Electronics Engineers, blz. 1446-1450

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

18 Citaten (Scopus)

Application of hyperplane arrangements to weight enumeration

Jurrius, R. P. M. J. & Pellikaan, G. R., 2014, AMS Special Session on Hyperplane Arrangements and Applications 2014 (Part of Joint Mathematics Meetings, Baltimore MD, USA, January 15-18, 2014).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Approximating real-time scheduling on identical machines

Bansal, N., Rutten, C., Ster, van der, S., Vredeveld, T. & Zwaan, van der, G. R. J., 2014, LATIN 2014: Theoretical Informatics (11th Latin American Symposium, Montevideo, Uruguay, March 31-April 4, 2014. Proceedings). Pardo, A. & Viola, A. (redactie). Berlin: Springer, blz. 550-561 (Lecture Notes in Computer Science; vol. 8392).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

2 Citaten (Scopus)

Approximating vector scheduling: almost matching upper and lower bounds

Bansal, N., Vredeveld, T. & Zwaan, van der, G. R. J., 2014, LATIN 2014: Theoretical Informatics (11th Latin American Symposium, Montevideo, Uruguay, March 31-April 4, 2014. Proceedings). Pardo, A. & Viola, A. (redactie). Berlin: Springer, blz. 47-59 (Lecture Notes in Computer Science; vol. 8392).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Citaten (Scopus)

Asymptotics of fingerprinting and group testing (Extended abstract)

Laarhoven, T. M. M., 2014, 4th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux (Eindhoven, The Netherlands, May 12-13, 2014). Skoric, B. & Ignatenko, T. (redactie). Eindhoven: Technische Universiteit Eindhoven, blz. 70-72

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
23 Downloads (Pure)

Batch NFS

Bernstein, D. J. & Lange, T., 2014, Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Joux, A. & Youssef, A. (redactie). Springer, blz. 38-58 (Lecture Notes in Computer Science; vol. 8781).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)

Better algorithms and hardness for broadcast scheduling via a discrepancy approach

Bansal, N., Charikar, M., Krishnaswamy, R. & Li, S., 2014, Proceedings 25th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'14, Portland OR, USA, January 5-7, 2014). Chekuri, C. (redactie). Philadelphia PA: Society for Industrial and Applied Mathematics (SIAM), blz. 55-71

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

18 Citaten (Scopus)
1 Downloads (Pure)

Capacities and capacity-achieving decoders for various fingerprinting games

Laarhoven, T. M. M., 2014, 2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'14, Salzburg, Austria, June 11-13, 2014). New York NY: Association for Computing Machinery, Inc, blz. 123-134

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

12 Citaten (Scopus)

Cryptanalyse en temps polynomial du schéma de McEliece basé sur les codes géométriques

Couvreur, A., Márquez-Corbella, I. & Pellikaan, G. R., 2014, Journées Codage et Cryptographie 2014 (Les Sept Laux, France, March 24-28, 2014). Grenoble: Institut Fourier, blz. 1-28

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Curve41417 : Karatsuba revisited

Bernstein, D. J., Chuengsatiansup, C. & Lange, T., 2014, Cryptographic Hardware and Embedded Systems - CHES 2014 (16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings). Batina, L. & Robshaw, M. (redactie). Berlin: Springer, blz. 316-334 (Lecture Notes in Computer Science; vol. 8731).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

16 Citaten (Scopus)

Discrete Ziggurat: A time-memory trade-off for sampling from a Gaussian distribution over the integers

Buchmann, J., Cabarcas, D., Göpfert, F., Hülsing, A. T. & Weiden, P., 2014, Selected Areas in Cryptography - SAC 2013 (20th International Conference, Burnaby BC, Canada, August 14-16, 2013. Revised Selected Papers). Lange, T., Lauter, K. & Lisonek, P. (redactie). Berlin: Springer, blz. 402-417 (Lecture Notes in Computer Science; vol. 8282).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

30 Citaten (Scopus)
1 Downloads (Pure)

Error-correcting pairs : a new approach to code-based cryptography

Márquez-Corbella, I. & Pellikaan, G. R., 2014, Computer Algebra in Coding Theory and Cryptography (Special Session at 20th Conference on Applications of Computer Algebra, ACA 2014, New York NY, USA, July 9-12, 2014). Martínexz-Moro, E., Kotsireas, I. & Szabo, S. (redactie). Spain: University of Valladolid, blz. 1-5

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Faster binary-field multiplication and faster binary-field MACs

Bernstein, D. J. & Chou, T., 2014, Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Joux, A. & Youssef, A. (redactie). Springer, blz. 92-111 (Lecture Notes in Computer Science).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)

Fast exhaustive search for quadratic systems in F_2 on FPGAs

Bouillaguet, C., Cheng, C. M., Chou, T., Niederhagen, R. F. & Yang, B. Y., 2014, Selected Areas in Cryptography - SAC 2013 (20th International Conference, Burnaby BC, Canada, August 14-16, 2013. Revised Selected Papers). Lange, T., Lauter, K. & Lisonek, P. (redactie). Berlin: Springer, blz. 205-212 (Lecture Notes in Computer Science; vol. 8282).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)

Improved approximation algorithm for two-dimensional bin packing

Bansal, N. & Khan, A., 2014, Proceedings 25th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'14, Portland OR, USA, January 5-7, 2014). Chekuri, C. (redactie). Philadelphia PA: Society for Industrial and Applied Mathematics (SIAM), blz. 13-25

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

29 Citaten (Scopus)

Kummer strikes back : new DH speed records

Bernstein, D. J., Chuengsatiansup, C., Lange, T. & Schwabe, P., 2014, Advances in Cryptology - ASIACRYPT 2014 (20th International Conference on the Theory and Application of Cryptology and Information Security, December 7-11, 2014, Kaohsiung, Taiwan. Proceedings, Part I). Sarkar, P. & Iwata, T. (redactie). Berlin: Springer, blz. 317-337 (Lecture Notes in Computer Science; vol. 8873).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

31 Citaten (Scopus)
2 Downloads (Pure)

Network-based dissolution

Bevern, van, R., Bredereck, R., Chen, J., Froese, V., Niedermeier, R. & Woeginger, G. J., 2014, Mathematical Foundations of Computer Science 2014 (39th International Symposium, MFCS 2014, Budapest, Hungary, August 25-29, 2014. Proceedings, Part II). Csuhaj-Varjú, E., Dietzfelbinger, M. & Ésik, Z. (redactie). Berlin: Springer, blz. 69-80 (Lecture Notes in Computer Science; vol. 8635).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

New developments in iterated rounding

Bansal, N., 2014, 34th International Conference on Foundation of Software Technology and Theoretical Computer Science (FSTTCS 2014, New Dehli, India, December 15-17, 2014). Raman, V. & Suresh, S. P. (redactie). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 1-10 (LIPIcs: Leibniz International Proceedings in Informatics; vol. 29).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
26 Downloads (Pure)

On the adaptivity gap of stochastic orienteering

Bansal, N. & Nagarajan, V., 2014, Integer Programming and Combinatorial Optimization (17th International Conference, IPCO 2014, Bonn, Germany, June 23-25, 2014. Proceedings). Lee, J. & Vygen, J. (redactie). Berlin: Springer, blz. 114-125 (Lecture Notes in Computer Science; vol. 8494).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)

On the practical exploitability of dual EC in TLS implementations

Checkoway, S., Fredrikson, M., Niederhagen, R. F., Everspaugh, A., Green, M., Lange, T., Ristenpart, T., Bernstein, D. J., Maskiewicz, J. & Shacham, H., 2014, Proceedings of the 23rd USENIX Security Symposium 20-22 August 2014, San Diego CA, USA. Usenix Association, blz. 319-335

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

54 Citaten (Scopus)

PandA : pairings and arithmetic

Chuengsatiansup, C., Naehrig, M., Ribarski, P. & Schwabe, P., 2014, Pairing-Based Cryptography – Pairing 2013 (6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers). Cao, Z. & Zhang, F. (redactie). Berlin: Springer, blz. 229-250 (Lecture Notes in Computer Science; vol. 8365).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)

Practical secure decision tree learning in a teletreatment application

Hoogh, de, S. J. A., Schoenmakers, B., Chen, P. & Op den Akker, H., 2014, Financial Cryptography and Data Security (18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers). Christin, N. & Safavi-Naini, R. (redactie). Berlin: Springer, blz. 179-194 (Lecture Notes in Computer Science; vol. 8437).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

8 Citaten (Scopus)
14 Downloads (Pure)

Revocation and non-repudiation : when the first destroys the latter

Braun, J., Kiefer, F. & Hülsing, A. T., 2014, Public Key Infrastructures, Services and Applications (10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers). Katsikas, S. & Agudo, I. (redactie). Berlin: Springer, blz. 31-46 (Lecture Notes in Computer Science; vol. 8341).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)
1 Downloads (Pure)

Star partitions of perfect graphs

Bevern, van, R., Bredereck, R., Bulteau, L., Chen, J., Froese, V., Niedermeier, R. & Woeginger, G. J., 2014, Automata, Languages and Programming (41st International Colloquium, ICALP 2014, Copenhagen, Denmark, Switzerland, July 8-11, 2014. Proceedings, Part I). Esparza, J., Fraigniard, P., Husfeldt, T. & Koutsoupias, E. (redactie). Berlin: Springer, blz. 174-185 (Lecture Notes in Computer Science; vol. 8572).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)