• Postbus 513, MF

    5600MB Eindhoven

    Nederland

Onderzoeksoutput

Filter
Conferentiebijdrage
2012

NEON crypto

Bernstein, D. J. & Schwabe, P., 2012, Cryptographic Hardware and Embedded Systems – CHES 2012 : 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings. Prouff, E. & Schaumont, P. (redactie). Berlin: Springer, blz. 320-339 (Lecture Notes in Computer Science; vol. 7428).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

54 Citaten (Scopus)

SipHash : a fast short-input PRF

Aumasson, J. P. & Bernstein, D. J., 2012, Progress in Cryptology - INDOCRYPT 2012 (13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings). Galbraith, S. & Nandi, M. (redactie). Berlin: Springer, blz. 489-508 (Lecture Notes in Computer Science; vol. 7668).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

51 Citaten (Scopus)

The (weighted) metric dimension of graphs: hard and easy cases

Epstein, L., Levin, A. & Woeginger, G. J., 2012, Graph-Theoretic Concepts in Computer Science (38th International Workshop, WG 2012, Jerusalem, Israel, June 26-28, 2012, Revised Selected Papers). Golumbic, M. C., Stern, M., Levy, A. & Morgenstern, G. (redactie). Berlin: Springer, blz. 114-125 (Lecture Notes in Computer Science; vol. 7551).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
11 Citaten (Scopus)
75 Downloads (Pure)

The geometry of extremal elements in a Lie algebra

Cohen, A. M., 2012, Buildings, finite geometries and groups : proceedings of a Satellite Conference, International Congress of Mathematicians, Hyderabad, India, 2010. Narasimha Sastry, N. S. (redactie). New York: Springer, blz. 15-35 21 blz. (Springer Proceedings in Mathematics (PROM); vol. 10).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)

The new SHA-3 software shootout

Bernstein, D. J. & Lange, T., 2012, Third SHA-3 Candidate Conference (Washington DC, USA, March 22-23, 2012). Gaithersburg MD: National Institute of Standards and Technology (NIST), blz. 1-13

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
45 Downloads (Pure)

The security impact of a new cryptographic library

Bernstein, D. J., Lange, T. & Schwabe, P., 2012, Progress in Cryptology - LATINCRYPT 2012 (2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings). Hevia, A. & Neven, G. (redactie). Berlin: Springer, blz. 159-176 (Lecture Notes in Computer Science; vol. 7533).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

91 Citaten (Scopus)

Tight time-space tradeoff for mutual exclusion

Bansal, N., Bhatt, V., Jayanti, P. & Kondapally, R., 2012, Proceedings of the 44th ACM Symposium on Theory of Computing (STOC'12, New York NY, USA, May 19-22, 2012). New York NY: Association for Computing Machinery, Inc, blz. 971-981

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Citaat (Scopus)
1 Downloads (Pure)

Transportation under nasty side constraints

Woeginger, G. J., 2012, Mathematical Foundations of Computer Science 2012 (37th International Symposium, MFCS 2012, Bratislava, Slovakia, August 27-31, 2012. Proceedings). Rovan, B., Sassone, V. & Widmayer, P. (redactie). Berlin: Springer, blz. 61-62 (Lecture Notes in Computer Science; vol. 7464).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Weighted geometric set multi-cover via quasi-uniform sampling

Bansal, N. & Pruhs, K. R., 2012, Algorithms – ESA 2012 (20th Annual European Symposium, Ljubljana, Slovenia, September 10-12, 2012. Proceedings). Epstein, L. & Ferragina, P. (redactie). Berlin: Springer, blz. 145-156 (Lecture Notes in Computer Science; vol. 7501).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

18 Citaten (Scopus)
2 Downloads (Pure)
2011

Analysis of multi-stage open shop processing systems

Eggermont, C. E. J., Schrijver, A. & Woeginger, G. J., 2011, Proceedings of the 28th Symposium on Theoretical Aspects of Computer Science (STACS'11, Dortmund, Germany, March 10-12, 2011). Schwentick, T. & Dürr, C. (redactie). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, blz. 484-494 (LIPIcs: Leibniz International Proceedings in Informatics).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
1 Citaat (Scopus)
64 Downloads (Pure)

A polylogarithmic competitive algorithm for the k-server problem

Bansal, N., Buchbinder, N., Madry, A. & Naor, J., 2011, Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS 2011, Palm Springs CA, USA, October 22-25, 2011). Ostrovsky, R. (redactie). Los Alamitos CA: IEEE Computer Society, blz. 267-276

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

32 Citaten (Scopus)
1 Downloads (Pure)

Attractive subfamilies of BLS curves for implementing high-security pairings

Costello, C., Lauter, K. & Naehrig, M., 2011, Progress in Cryptology - INDOCRYPT 2011 (12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings). Bernstein, D. J. & Chatterjee, S. (redactie). Berlin: Springer, blz. 320-342 (Lecture Notes in Computer Science; vol. 7107).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

14 Citaten (Scopus)

Can homomorphic encryption be practical?

Lauter, K., Naehrig, M. & Vaikuntanathan, V., 2011, Proceedings of the ACM Cloud Computing Security Workshop (CCSW 2011, Chicago IL, USA, October 21, 2011). New York NY: Association for Computing Machinery, Inc, blz. 113-124

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

498 Citaten (Scopus)
1 Downloads (Pure)

Deterministic discrepancy minimization

Bansal, N. & Spencer, J., 2011, Algorithms - ESA 2011 (19th Annual European Symposium, Ljubljana, Slovenia, September 5-9, 2011. Proceedings). Demetrescu, C. & Halldorsson, M. H. (redactie). Berlin: Springer, blz. 408-420 (Lecture Notes in Computer Science; vol. 6942).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Citaten (Scopus)

Domination when the stars are out

Hermelin, D., Mnich, M., Leeuwen, van, E. J. & Woeginger, G. J., 2011, Automata, Languages and Programming (38th International Colloquium, ICALP 2011, Zürich, Switzerland, July 4-8, 2011. Proceedings, Part I). Aceto, L., Henzinger, M. & Sgall, J. (redactie). Berlin: Springer, blz. 462-473 (Lecture Notes in Computer Science; vol. 6755).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

18 Citaten (Scopus)
1 Downloads (Pure)

Elliptic curves for applications (Tutorial)

Lange, T., 2011, Progress in Cryptology - INDOCRYPT 2011 (12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings). Bernstein, D. J. & Chatterjee, S. (redactie). Berlin: Springer, blz. 2-2 (Lecture Notes in Computer Science; vol. 7107).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageProfessioneel

2 Downloads (Pure)

Evaluation of public-key cryptosystems based on algebraic geometry codes

Márquez-Corbella, I., Martínez-Moro, E. & Pellikaan, G. R., 2011, Proceedings of the Third International Castle Meeting on Coding Theory and Applications (3ICMTA, Cardona Castle, Barcelona, Spain, September 11-15, 2011). Borges, J. & Villanueva, M. (redactie). Barcelona: Servei de Publicacions de la Universitat Autònoma de Barcelona, blz. 199-204

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Faster 2-regular information-set decoding

Bernstein, D. J., Lange, T., Peters, C. P. & Schwabe, P., 2011, Coding and Cryptology (Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings). Chee, Y. M. (redactie). Berlin: Springer, blz. 81-98 (Lecture Notes in Computer Science; vol. 6639).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)

Formal privacy analysis of communication protocols for identity management

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2011, Information Systems Security (7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011. Proceedings). Jajodia, S. & Mazumdar, C. (redactie). Berlin: Springer, blz. 235-249 (Lecture Notes in Computer Science; vol. 7093).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

7 Citaten (Scopus)
2 Downloads (Pure)

High-speed high-security signatures

Bernstein, D. J., Duif, N., Lange, T., Schwabe, P. & Yang, B. Y., 2011, Cryptographic Hardware and Embedded Systems - CHES 2011 (13th International Workshop, Nara, Japan, September 28–October 1, 2011. Proceedings). Preneel, B. & Takagi, T. (redactie). Berlin: Springer, blz. 124-142 (Lecture Notes in Computer Science; vol. 6917).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

61 Citaten (Scopus)

Min-max graph partitioning and small set expansion

Bansal, N., Feige, U., Krauthgamer, R., Makarychev, K., Magarajan, V., Naor, J. & Schwartz, R., 2011, Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS 2011, Palm Springs CA, USA, October 22-25, 2011). Ostrovsky, R. (redactie). Los Alamitos CA: IEEE Computer Society, blz. 17-26

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
31 Citaten (Scopus)
75 Downloads (Pure)

Modeling identity-related properties and their privacy strength

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2011, Formal Aspects of Security and Trust (7th International Workshop, FAST'10, Pisa, Italy, September 16-17, 2010. Revised Selected Papers). Degano, P., Etalle, S. & Guttman, J. (redactie). Berlin: Springer, blz. 126-140 (Lecture Notes in Computer Science; vol. 6561).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

8 Citaten (Scopus)
2 Downloads (Pure)

On capacitated set cover problems

Bansal, N., Krishnaswamy, R. & Saha, B., 2011, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (14th International Workshop, APPROX 2011, and 15th International Workshop, RANDOM 2011, Princeton, NJ, USA, August 17-19, 2011. Proceedings). Goldberg, L. A., Jansen, K., Ravi, R. & Rolim, J. D. P. (redactie). Berlin: Springer, blz. 38-49 (Lecture Notes in Computer Science; vol. 6845).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)

On the correct use of the negation map in the Pollard rho method

Bernstein, D. J., Lange, T. & Schwabe, P., 2011, Public Key Cryptography - PKC 2011 (14th International Conference on Practice and Theory in Public-Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings). Catalano, D., Fazio, N., Gennaro, R. & Nicolosi, A. (redactie). Berlin: Springer, blz. 128-146 (Lecture Notes in Computer Science; vol. 6571).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

23 Citaten (Scopus)

On the security of the Winternitz one-time signature scheme

Buchmann, J., Dahmen, E., Ereth, S., Hülsing, A. & Rückert, M., 2011, Progress in Cryptology – AFRICACRYPT 2011 : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011 Proceedings. Nitaj, A. & Pointcheval, D. (redactie). Berlin: Springer, blz. 363-378 16 blz. (Lecture Notes in Computer Science; vol. 6737).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

33 Citaten (Scopus)

Reachability and deadlocking problems in multi-stage scheduling

Eggermont, C. E. J. & Woeginger, G. J., 2011, Reachability Problems (5th International Workshop, RP 2011, Genoa, Italy, September 28-30, 2011. Proceedings). Delzanno, G. & Potapov, I. (redactie). Berlin: Springer, blz. 153-164 (Lecture Notes in Computer Science; vol. 6945).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Really fast syndrome-based hashing

Bernstein, D. J., Lange, T., Peters, C. P. & Schwabe, P., 2011, Progress in Cryptology - AfricaCrypt 2011 (4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings). Nitaj, A. & Pointcheval, D. (redactie). Berlin: Springer, blz. 134-152 (Lecture Notes in Computer Science; vol. 6737).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

10 Citaten (Scopus)

Smaller decoding exponents : ball-collision decoding

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, Advances in Cryptology - CRYPTO 2011 (31st Annual International Cryptology Conference, Santa Barbara CA, USA, August 14-18, 2011. Proceedings). Rogaway, P. (redactie). Berlin: Springer, blz. 743-760 (Lecture Notes in Computer Science; vol. 6841).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

76 Citaten (Scopus)

Stability in multi-skill workforce assignments : complexity analysis and stable assignments polytope

Hurkens, C. A. J. & Firat, M., 2011, 10th Workshop on Models and Algorithms for Planning and Scheduling Problems (MAPSP), Nymburk, Czech Republic, 2011 July 19-24. Praha: Charles University Press, blz. 222-224 (ITI series; vol. 2011-525).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Downloads (Pure)

The Cinderella game on holes and anti-holes

Bodlaender, M. H. L., Hurkens, C. A. J. & Woeginger, G. J., 2011, Graph-Theoretic Concepts in Computer Science (37th International Workshop, WG 2011, Teplá Monastery, Czech Republic, June 21-24, 2011. Revised Papers). Kolman, P. & Kratochvil, J. (redactie). Berlin: Springer, blz. 71-82 (Lecture Notes in Computer Science; vol. 6986).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Citaten (Scopus)

The non-gap sequence of a subcode of a generalized Reed-Solomon code

Márquez-Corbella, I., Martínez-Moro, E. & Pellikaan, G. R., 2011, Seventh International Workshop on Coding and Cryptography 2011 (WCC 2011, Paris, France, April 11-15, 2011). blz. 1-10

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
69 Downloads (Pure)

Two-bounded-space bin packing revisited

Chrobak, M., Sgall, J. & Woeginger, G. J., 2011, Algorithms - ESA 2011 (19th Annual European Symposium, Ljubljana, Slovenia, September 5-9, 2011. Proceedings). Demetrescu, C. & Halldorsson, M. H. (redactie). Berlin: Springer, blz. 263-274 (Lecture Notes in Computer Science; vol. 6942).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)
1 Downloads (Pure)

Unweighted coalitional manipulation under the Borda rule is NP-hard

Betzler, N., Niedermeier, R. & Woeginger, G. J., 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI 2011, Barcelona, Catalonia, Spain, July 16-22, 2011). Walsh, T. (redactie). Menlo Park CA: AAI Press, blz. 55-60

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

55 Citaten (Scopus)
2 Downloads (Pure)

Vehicle refueling with limited resources

Firat, M., Hurkens, C. A. J. & Woeginger, G. J., 2011, 10th Workshop on Models and Algorithms for Planning and Scheduling Problems (MAPSP), Nymburk, Czech Republic, 2011 July 19-24. Praha: Charles University Press, blz. 134-136 (ITI series; vol. 2011-525).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

1 Downloads (Pure)

Wild McEliece

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, Selected Areas in Cryptography (17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers). Biryukov, A., Gong, G. & Stinson, D. R. (redactie). Berlin: Springer, blz. 143-158 (Lecture Notes in Computer Science; vol. 6544).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

31 Citaten (Scopus)
1 Downloads (Pure)

Wild McEliece Incognito

Bernstein, D. J., Lange, T. & Peters, C. P., 2011, Post-Quantum Cryptography (4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings). Yang, B. Y. (redactie). Berlin: Springer, blz. 244-254 (Lecture Notes in Computer Science; vol. 7071).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

15 Citaten (Scopus)

XMSS : a practical forward secure signature scheme based on minimal security assumptions

Buchmann, J., Dahmen, E. & Hülsing, A., 2011, Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings. Yang, B-Y. (redactie). Berlin: Springer, blz. 117-129 13 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

92 Citaten (Scopus)
1 Downloads (Pure)
2010

An algorithmic analysis of the honey-bee game

Fleischer, R. & Woeginger, G. J., 2010, Fun with Algorithms (5th International Conference, FUN 2010, Iscia, Italy, June 2-4, 2010. Proceedings). Boldi, P. (redactie). Berlin: Springer, blz. 178-189 (Lecture Notes in Computer Science; vol. 6099).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

5 Citaten (Scopus)

An algorithmic study of switch graphs

Katz, B., Rutter, I. & Woeginger, G. J., 2010, Graph-Theoretic Concepts in Computer Science (35th International Workshop, WG 2009, Montpellier, France, June 24-26, 2009. Revised Papers). Paul, C. & Habib, M. (redactie). Berlin: Springer, blz. 226-237 (Lecture Notes in Computer Science; vol. 5911).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Citaten (Scopus)

Anonymous credential schemes with encrypted attributes

Guajardo, J., Mennink, B. & Schoenmakers, B., 2010, Cryptology and Network Security (9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings). Heng, S-H., Wright, R. N. & Goi, B-M. (redactie). Berlin: Springer, blz. 314-333 (Lecture Notes in Computer Science; vol. 6467).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

3 Citaten (Scopus)

Between a rock and a hard place: the two-to-one assignment problem

Goossens, D. R., Polyakovskiy, S., Spieksma, F. C. R. & Woeginger, G. J., 2010, Approximation and Online Algorithms (7th International Workshop, WAOA 2009, Copenhagen, Denmark, September 10-11, 2009. Revised Papers). Bampis, E. & Jansen, K. (redactie). Berlin: Springer, blz. 159-169 (Lecture Notes in Computer Science; vol. 5893).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Caching is hard, even in the fault model

Chrobak, M., Woeginger, G. J., Makino, K. & Xu, H., 2010, Algorithms - ESA 2010 (18th Annual European Symposium, Liverpool, UK, September 6-8, 2010. Proceedings, Part I). Berg, de, M. & Meyer, U. (redactie). Berlin: Springer, blz. 195-206 (Lecture Notes in Computer Science; vol. 6346).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

14 Citaten (Scopus)

Computationally efficient searchable symmetric encryption

Liesdonk, van, P. P., Sedghi, S., Doumen, J. M., Hartel, P. H. & Jonker, W., 2010, Secure Data Management (7th VLDB workshop, SDM 2010, Singapore, September 17, 2010. Proceedings). Jonker, W. & Petkovic, M. (redactie). Berlin: Springer, blz. 87-100 (Lecture Notes in Computer Science; vol. 6358).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

119 Citaten (Scopus)
7 Downloads (Pure)

Easy composition of symbolic computation software: a new lingua franca for symbolic computation

Linton, S., Hammond, K., Konovalov, A., Al Zain, A. D., Trinder, R., Roozemond, D. A. & Horn, P., 2010, Proceedings of the 35th International Symposium on Symbolic and Algebraic Computation (ISSAC 2010, Munich, Germany, July 25-28, 2010). New York NY: Association for Computing Machinery, Inc, blz. 339-346

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

6 Citaten (Scopus)

ECC2K-130 on Cell CPUs

Bos, J. W., Kleinjung, T., Niederhagen, R. F. & Schwabe, P., 2010, Progress in Cryptology - AfricaCrypt 2010 (Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings). Bernstein, D. J. & Lange, T. (redactie). Berlin: Springer, blz. 225-242 (Lecture Notes in Computer Science; vol. 6055).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

16 Citaten (Scopus)

ECC2K-130 on NVIDIA GPUs

Bernstein, D. J., Chen, H-C., Cheng, C. M., Lange, T., Niederhagen, R. F., Schwabe, P. & Yang, B. Y., 2010, Progress in Cryptology - INDOCRYPT 2010 (11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings). Gong, G. & Gupta, K. C. (redactie). Berlin: Springer, blz. 328-346 (Lecture Notes in Computer Science; vol. 6498).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Open Access
Bestand
12 Citaten (Scopus)
196 Downloads (Pure)

Exact algorithms for coloring graphs while avoiding monochromatic cycles

Talla Nobibon, F., Hurkens, C. A. J., Leus, R. & Spieksma, F. C. R., 2010, Algorithmic Aspects in Information and Management (6th International Conference, AAIM 2010, Weihai, China, July 19-21, 2010. Proceedings). Chen, B. (redactie). Berlin: Springer, blz. 229-242 (Lecture Notes in Computer Science; vol. 6124).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Citaten (Scopus)

Faster pairing computations on curves with high-degree twists

Costello, C., Lange, T. & Naehrig, M., 2010, Public Key Cryptography - PKC 2010 (13th International Conference on Practice and Theory in Public-Key Cryptography, Paris, France, May 26-28, 2010. Proceedings). Nguyen, P. Q. & Pointcheval, D. (redactie). Berlin: Springer, blz. 224-242 (Lecture Notes in Computer Science; vol. 6056).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

56 Citaten (Scopus)

Fast exhaustive search for polynomial systems in F2

Bouillaguet, C., Chen, H-C., Cheng, C. M., Chou, T., Niederhagen, R. F., Shamir, A. & Yang, B. Y., 2010, Cryptographic Hardware and Embedded Systems - CHES 2010 (12th International Workshop, Santa Barbara CA, USA, August 17-20, 2010. Proceedings). Mangard, S. & Standaert, F. X. (redactie). Berlin: Springer, blz. 203-218 (Lecture Notes in Computer Science; vol. 6225).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

32 Citaten (Scopus)

Improved primitives for secure multiparty integer computation

Catrina, O. & Hoogh, de, S. J. A., 2010, Security and Cryptography for Networks (7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings). Garay, J. A. & De Prisco, R. (redactie). Berlin: Springer, blz. 182-199 (Lecture Notes in Computer Science; vol. 6280).

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

56 Citaten (Scopus)
1 Downloads (Pure)