Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
113 | Travis J. Desell, Kaoutar El Maghraoui, Carlos A. Varela |
Malleable applications for scalable high performance computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 10(3), pp. 323-337, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
MPI, High performance computing, Dynamic reconfiguration, Actors, SALSA, Malleability |
112 | Philip D. MacKenzie, Michael K. Reiter, Ke Yang |
Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 171-190, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
112 | Julita Corbalán, Xavier Martorell, Jesús Labarta |
Improving Gang Scheduling through job performance analysis and malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Proceedings of the 15th international conference on Supercomputing, ICS 2001, Sorrento, Napoli, Italy, June 16-21, 2001, pp. 303-311, 2001, ACM, 1-58113-410-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
98 | Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki |
A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers, pp. 87-112, 2003, Springer, 3-540-23635-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
unjudgment, symmetric-content-non-malleability, symmetric-content-indistinguishability, symmetric-key-indistinguishablity, symmetric-content-length-indistinguishability, encryption, judgment, deduction systems |
82 | Kaoutar El Maghraoui, Travis J. Desell, Boleslaw K. Szymanski, Carlos A. Varela |
Dynamic Malleability in Iterative MPI Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 14-17 May 2007, Rio de Janeiro, Brazil, pp. 591-598, 2007, IEEE Computer Society, 0-7695-2833-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
74 | SungJun Min, Go Yamamoto, Kwangjo Kim |
Weak Property of Malleability in NTRUSign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 379-390, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
NTRUSign, Strong Existential Forgery, Centered Norm, Digital Signature Scheme, Malleability |
68 | Olivier Baudron, David Pointcheval, Jacques Stern |
Extended Notions of Security for Multicast Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 27th International Colloquium, ICALP 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings, pp. 499-511, 2000, Springer, 3-540-67715-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Multicast encryption, semantic security, non-malleability |
68 | Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway |
Relations Among Notions of Security for Public-Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 26-45, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness |
61 | Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti |
Simulation-Based Concurrent Non-malleable Commitments and Decommitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 91-108, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi |
Foundations of Non-malleable Hash and One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 524-541, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Dimitrios S. Nikolopoulos |
Malleable Memory Mapping: User-Level Control of Memory Bounds for Effective Program Adaptation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings, pp. 2, 2003, IEEE Computer Society, 0-7695-1926-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Relations Among Notions of Non-malleability for Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 519-535, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption, Non-malleability |
53 | Juan A. Garay, Philip D. MacKenzie, Ke Yang |
Strengthening Zero-Knowledge Protocols Using Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 19(2), pp. 169-209, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Simulation soundness, Signatures, Zero knowledge, Non-malleability |
53 | Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 271-289, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Non-interactive Zero-knowledge Proofs, Public-key Encryption, Semantic Security, Non-malleability |
53 | Ran Canetti, Marc Fischlin |
Universally Composable Commitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 19-40, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
security analysis of protocols, non-malleability, Commitment schemes, concurrent composition |
53 | Helena Handschuh, Yiannis Tsiounis, Moti Yung |
Decision Oracles are Equivalent to Matching Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 276-289, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems |
52 | Marc Fischlin |
Security of NMACand HMACBased on Non-malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 138-154, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Jérémy Buisson, Omer Ozan Sonmez, Hashim H. Mohamed, Wouter Lammers, Dick H. J. Epema |
Scheduling malleable applications in multicluster systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: Proceedings of the 2007 IEEE International Conference on Cluster Computing, 17-20 September 2007, Austin, Texas, USA, pp. 372-381, 2007, IEEE Computer Society, 978-1-4244-1387-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart |
Flaws in Applying Proof Methodologies to Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 93-110, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Huijia Lin, Rafael Pass, Muthuramakrishnan Venkitasubramaniam |
A unified framework for concurrent security: universal composability from stand-alone non-malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 179-188, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secure multi-party computation, universal composability, non-malleability |
44 | Huijia Lin, Rafael Pass |
Non-malleability amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 189-198, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptography, commitment, non-malleability, round complexity |
43 | Benoît Libert, Thomas Peters, Marc Joye, Moti Yung |
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings, pp. 514-532, 2014, Springer, 978-3-642-55219-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
43 | Benoît Libert, Thomas Peters, Marc Joye, Moti Yung |
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 691, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
37 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 427-444, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
black-box constructions, Public-key encryption, semantic security, non-malleability |
37 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 1-19, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability |
37 | Claudia Leopold, Michael Süß |
Observations on MPI-2 Support for Hybrid Master/Slave Applications in Dynamic and Heterogeneous Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PVM/MPI ![In: Recent Advances in Parallel Virtual Machine and Message Passing Interface, 13th European PVM/MPI User's Group Meeting, Bonn, Germany, September 17-20, 2006, Proceedings, pp. 285-292, 2006, Springer, 3-540-39110-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dynamic process management, hybrid MPI/OpenMP, master/slave pattern, adaptivity, malleability |
37 | Chuan Yue, Richard Tran Mills, Andreas Stathopoulos, Dimitrios S. Nikolopoulos |
Runtime Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, HPDC-15, Paris, France, June 19-23, 2006, pp. 183-194, 2006, IEEE, 1-4244-0307-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
memory server, memory adaptation, local disk memory, remote memory capability, shared computational resource, network memory, memory malleability, MPI communication, cache memory, scientific application, virtual memory system |
37 | Hiroki Hada, Keisuke Tanaka |
Security for Authenticated Key Exchange Based on Non-Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 508-513, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Gladys Utrera, Julita Corbalán, Jesús Labarta |
Another approach to backfilled jobs: applying virtual malleability to expired windows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Proceedings of the 19th Annual International Conference on Supercomputing, ICS 2005, Cambridge, Massachusetts, USA, June 20-22, 2005, pp. 313-322, 2005, ACM, 1-59593-167-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Gladys Utrera, Julita Corbalán, Jesús Labarta |
Implementing Malleability on MPI Jobs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE PACT ![In: 13th International Conference on Parallel Architectures and Compilation Techniques (PACT 2004), 29 September - 3 October 2004, Antibes Juan-les-Pins, France, pp. 215-224, 2004, IEEE Computer Society, 0-7695-2229-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Ran Canetti, Mayank Varia |
Non-malleable Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 73-90, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Douglas Wikström |
Simplified Submission of Inputs to Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 293-308, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Bounded CCA2-Secure Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 502-518, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Grégory Bourguin |
Lessons learned from the implementation of a reflexive groupware system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHM ![In: Proceedings of the 15th French-speaking conference on human-computer interaction on 15eme Conference Francophone sur l'Interaction Homme-Machine, IHM 2003, Caen, France, November 25-28, 2003, pp. 40-47, 2003, ACM, 1-58113-803-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
model approach, CSCW, reflectivity, coevolution, activity theory |
30 | Juan A. Garay, Philip D. MacKenzie, Ke Yang 0005 |
Strengthening Zero-Knowledge Protocols Using Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 177-194, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Yan Zong Ding, Michael O. Rabin |
Hyper-Encryption and Everlasting Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACS ![In: STACS 2002, 19th Annual Symposium on Theoretical Aspects of Computer Science, Antibes - Juan les Pins, France, March 14-16, 2002, Proceedings, pp. 1-26, 2002, Springer, 3-540-43283-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Yiannis Tsiounis, Moti Yung |
On the Security of ElGamal Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 117-134, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Nicholas Palmer, Roelof Kemp, Thilo Kielmann, Henri E. Bal |
Ibis for mobility: solving challenges of mobile computing using grid techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotMobile ![In: Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, HotMobile 2009, Santa Cruz, California, USA, February 23-24, 2009, 2009, ACM, 978-1-60558-283-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
elastic computing, fault tolerance, mobile computing, mobility, grid computing, distributed computing, high performance computing, smartphone, malleability, Ibis |
22 | William Harrison |
De-constructing and re-constructing aspect-orientation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOAL ![In: Proceedings of the 7th Workshop on Foundations of Aspect-Oriented Languages, FOAL 2008, Brussels, Belgium, April 1, 2008, pp. 43-50, 2008, ACM, 978-1-60558-110-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
specification, broadcast, modularity, separation-of-concerns, encapsulation, complex-event-processing, aspect-oriented, software-composition, obliviousness, malleability, event-flow |
22 | Rafael Pass, Alon Rosen |
New and improved constructions of non-malleable cryptographic protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 533-542, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
non black-box simulation, cryptography, zero-knowledge, non-malleability, round-complexity, man-in-the-middle |
22 | Ivan Damgård, Jens Groth |
Non-interactive and reusable non-malleable commitment schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, USA, pp. 426-437, 2003, ACM, 1-58113-674-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
signature, commitment, one-way function, universal composability, non-malleability |
21 | Iker Martín-Álvarez, José Ignacio Aliaga, Maribel Castillo, Sergio Iserte, Rafael Mayo 0002 |
Dynamic spawning of MPI processes applied to malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. High Perform. Comput. Appl. ![In: Int. J. High Perform. Comput. Appl. 38(2), pp. 69-93, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Jesús Carretero 0001, Estela Suarez, Martin Schulz 0001 |
Malleability techniques applications in high-performance computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. High Perform. Comput. Appl. ![In: Int. J. High Perform. Comput. Appl. 38(2), pp. 53-54, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Joel Criado, Victor Lopez 0003, Joan Vinyals-Ylla-Catala, Guillem Ramirez-Miranda, Xavier Teruel, Marta Garcia-Gasulla |
Role-shifting threads: Increasing OpenMP malleability to address load imbalance at MPI and OpenMP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. High Perform. Comput. Appl. ![In: Int. J. High Perform. Comput. Appl. 38(2), pp. 94-107, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Keith L. Downing |
The Evolution of Conformity, Malleability, and Influence in Simulated Online Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Life ![In: Artif. Life 29(4), pp. 394-420, Fall 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Nuno David |
Implementations, interpretative malleability, value-laden-ness and the moral significance of agent-based social simulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI Soc. ![In: AI Soc. 38(4), pp. 1565-1577, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Eva Milková, Simona Pekarkova |
Spatial skills malleability of pre-school children. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Interact. Learn. Environ. ![In: Interact. Learn. Environ. 31(5), pp. 3244-3256, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Willow Barkan-Vered, Franklin Harding, Jonathan Keller, Jiayu Xu |
On the Non-Malleability of ECVRF in the Algebraic Group Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1004, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
21 | Jon Back, Karin B. Johansson, Jonas Hangvar |
Let's Play Something New!: Designing for Digital Malleability in Outdoor Playgrounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MindTrek ![In: Proceedings of the 26th International Academic Mindtrek Conference, Mindtrek 2023, Tampere, Finland, October 3-6, 2023, pp. 233-244, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Iker Martín-Álvarez, José Ignacio Aliaga, Maribel Castillo, Sergio Iserte |
Configurable synthetic application for studying malleability in HPC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 31st Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2023, Naples, Italy, March 1-3, 2023, pp. 128-135, 2023, IEEE, 979-8-3503-3763-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Xiao Liang 0014, Omkant Pandey, Takashi Yamakawa |
A New Approach to Post-Quantum Non-Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 64th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2023, Santa Cruz, CA, USA, November 6-9, 2023, pp. 568-579, 2023, IEEE, 979-8-3503-1894-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Daniele Friolo, Matteo Salvino, Daniele Venturi 0001 |
On the Complete Non-malleability of the Fujisaki-Okamoto Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II, pp. 307-335, 2023, Springer, 978-3-031-33490-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Hugo Taboada, Romain Pereira, Julien Jaeger, Jean-Baptiste Besnard |
Towards Achieving Transparent Malleability Thanks to MPI Process Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC Workshops ![In: High Performance Computing - ISC High Performance 2023 International Workshops, Hamburg, Germany, May 21-25, 2023, Revised Selected Papers, pp. 28-41, 2023, Springer, 978-3-031-40842-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Yaxin Liu, Stella F. Lourenco |
Trial history influences the malleability of gender differences in children's mental rotation performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 45th Annual Meeting of the Cognitive Science Society, CogSci 2023, Sydney, NSW, Australia, July 26-29, 2023, 2023, cognitivesciencesociety.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
21 | Divesh Aggarwal, Eldon Chung, Maciej Obremski |
Extractors: Low Entropy Requirements Colliding with Non-malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (2) ![In: Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II, pp. 580-610, 2023, Springer, 978-3-031-38544-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Krista Francis, S. Rothschuh, D. Poscente, B. Davis |
Malleability of Spatial Reasoning With Short-Term and Long-Term Robotics Interventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Technol. Knowl. Learn. ![In: Technol. Knowl. Learn. 27(3), pp. 927-956, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Horst Treiblmaier, Evgeny Gorbunov |
On the Malleability of Consumer Attitudes toward Disruptive Technologies: A Pilot Study of Cryptocurrencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 13(6), pp. 295, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Marshall Ball, Dana Dachman-Soled, Julian Loss |
(Nondeterministic) Hardness vs. Non-Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR22, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
21 | Xiao Liang 0014, Omkant Pandey, Takashi Yamakawa |
A New Approach to Post-Quantum Non-Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.05861, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Piotr Siuda, Jakub Nowak, Robert W. Gehl |
Darknet imaginaries in Internet memes: the discursive malleability of the cultural status of digital technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Mediat. Commun. ![In: J. Comput. Mediat. Commun. 28(1), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Denis Firsov, Sven Laur, Ekaterina Zhuchko |
Formal Analysis of Non-Malleability for Commitments in EasyCrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 32, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
21 | Marshall Ball, Dana Dachman-Soled, Julian Loss |
(Nondeterministic) Hardness vs. Non-Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 70, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
21 | Daniele Friolo, Matteo Salvino, Daniele Venturi 0001 |
On the Complete Non-Malleability of the Fujisaki-Okamoto Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1654, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
21 | Xiao Liang 0014, Omkant Pandey, Takashi Yamakawa |
A New Approach to Post-Quantum Non-Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 907, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
21 | Panagiotis Chatzigiannis, Konstantinos Chalkias |
Base64 Malleability in Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 361, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
21 | Denis Firsov, Sven Laur, Ekaterina Zhuchko |
Unsatisfiability of Comparison-Based Non-malleability for Commitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAC ![In: Theoretical Aspects of Computing - ICTAC 2022 - 19th International Colloquium, Tbilisi, Georgia, September 27-29, 2022, Proceedings, pp. 188-194, 2022, Springer, 978-3-031-17714-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Eishi Arima, Isaías Comprés, Martin Schulz 0001 |
On the Convergence of Malleability and the HPC PowerStack: Exploiting Dynamism in Over-Provisioned and Power-Constrained HPC Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC Workshops ![In: High Performance Computing. ISC High Performance 2022 International Workshops - Hamburg, Germany, May 29 - June 2, 2022, Revised Selected Papers, pp. 206-217, 2022, Springer, 978-3-031-23219-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Joel Criado, Víctor López 0003, Joan Vinyals-Ylla-Catala, Guillem Ramirez-Miranda, Xavier Teruel, Marta Garcia-Gasulla |
Exploiting OpenMP Malleability with Free Agent Threads and DLB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC Workshops ![In: High Performance Computing. ISC High Performance 2022 International Workshops - Hamburg, Germany, May 29 - June 2, 2022, Revised Selected Papers, pp. 162-175, 2022, Springer, 978-3-031-23219-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Jophin John, Isaac David Núñez Araya, Michael Gerndt |
iCheck: Leveraging RDMA and Malleability for Application-Level Checkpointing in HPC Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 28th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2022, Nanjing, China, January 10-12, 2023, pp. 467-474, 2022, IEEE, 978-1-6654-7315-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Konstantinos Chalkias, Panagiotis Chatzigiannis |
Base64 Malleability in Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022, pp. 1219-1221, 2022, ACM, 978-1-4503-9140-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Jesús Carretero 0001, David Exposito Singh, Alberto Cascajo, Raffaele Montella |
Malleability Techniques for HPC Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPAM (2) ![In: Parallel Processing and Applied Mathematics - 14th International Conference, PPAM 2022, Gdansk, Poland, September 11-14, 2022, Revised Selected Papers, Part II, pp. 77-88, 2022, Springer, 978-3-031-30444-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Marshall Ball, Dana Dachman-Soled, Julian Loss |
(Nondeterministic) Hardness vs. Non-malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part I, pp. 148-177, 2022, Springer, 978-3-031-15801-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Sonica Saraf, Lai-Sang Young |
Malleability of gamma rhythms enhances population-level correlations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Neurosci. ![In: J. Comput. Neurosci. 49(2), pp. 189-205, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai 0001, Goichiro Hanaoka, Kanta Matsuura |
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1), pp. 89-103, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Sergio Iserte, Rafael Mayo 0002, Enrique S. Quintana-Ortí, Antonio J. Peña |
DMRlib: Easy-Coding and Efficient Resource Management for Job Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 70(9), pp. 1443-1457, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Sagnik Sen 0002, Ashmita Dey, Sanghamitra Bandhyopadhyay, Vladimir N. Uversky, Ujjwal Maulik |
Understanding structural malleability of the SARS-CoV-2 proteins and relation to the comorbidities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Briefings Bioinform. ![In: Briefings Bioinform. 22(6), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Eldon Chung, Maciej Obremski, Divesh Aggarwal |
Extractors: Low Entropy Requirements Colliding With Non-Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR21, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Eldon Chung, Maciej Obremski, Divesh Aggarwal |
Extractors: Low Entropy Requirements Colliding With Non-Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.04157, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Péter Kutas, Simon-Philipp Merz, Christophe Petit 0001, Charlotte Weitkämper |
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 282, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Eldon Chung, Maciej Obremski, Divesh Aggarwal |
Extractors: Low Entropy Requirements Colliding With Non-Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1480, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Kashif Mehboob Khan, Junaid Arshad, Muhammad Mubashir Khan |
Empirical analysis of transaction malleability within blockchain-based e-Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 100, pp. 102081, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Ebenezer Joseph, Veena Easvaradoss, David Chandran, Suneera Abraham, Sweta Vaddadi |
Malleability of Intelligence Through Chess Training - A Two Year Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 43rd Annual Meeting of the Cognitive Science Society, CogSci 2021, virtual, July 26-29, 2021, 2021, cognitivesciencesociety.org. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Dongyuan Liu |
machinesMemory: Malleability of AI technique, the data generated by machine learning algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EVA ![In: Electronic Visualisation and the Arts, EVA 2021, London, UK, July 5-9, 2021, 2021, BCS. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Péter Kutas, Simon-Philipp Merz, Christophe Petit 0001, Charlotte Weitkämper |
One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part I, pp. 242-271, 2021, Springer, 978-3-030-77869-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Iker Martín-Álvarez, José Ignacio Aliaga, María Isabel Castillo, Rafael Mayo 0002, Sergio Iserte |
Malleability Implementation in a MPI Iterative Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: IEEE International Conference on Cluster Computing, CLUSTER 2021, Portland, OR, USA, September 7-10, 2021, pp. 801-802, 2021, IEEE, 978-1-7281-9666-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Sanjit Chatterjee, Berkant Ustaoglu |
Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Math. Commun. ![In: Adv. Math. Commun. 14(2), pp. 177-205, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Sergio Iserte, Krzysztof Rojek |
An study of the effect of process malleability in the energy efficiency on GPU-based clusters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 76(1), pp. 255-274, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Rafael Rodríguez-Sánchez 0001, Francisco D. Igual, Enrique S. Quintana-Ortí |
Integration and exploitation of intra-routine malleability in BLIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 76(4), pp. 2860-2875, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Kashif Mehboob Khan, Junaid Arshad, Muhammad Mubashir Khan |
Simulation of transaction malleability attack for blockchain-based e-Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 83, pp. 106583, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan |
Non-Malleability against Polynomial Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR20, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan |
Non-Malleability against Polynomial Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 147, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Thekla Morgenroth, Michelle Stratemeyer, Benjamin Paaßen |
The Gendered Nature and Malleability of Gamer Stereotypes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyberpsychology Behav. Soc. Netw. ![In: Cyberpsychology Behav. Soc. Netw. 23(8), pp. 557-561, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin |
Limits to Non-Malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCS ![In: 11th Innovations in Theoretical Computer Science Conference, ITCS 2020, January 12-14, 2020, Seattle, Washington, USA., pp. 80:1-80:32, 2020, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-134-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Ebenezer Joseph, Veena Easvaradoss, Suneera Abraham, Sweta Vaddadi |
Malleability of Working Memory Through Chess in Schoolchildren - A Two-Year Intervention Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 42th Annual Meeting of the Cognitive Science Society - Developing a Mind: Learning in Humans, Animals, and Machines, CogSci 2020, virtual, July 29 - August 1, 2020, 2020, cognitivesciencesociety.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Momme von Sydow, Niels Braus, Ulrike Hahn |
On the Malleability and Stability of Ignoring Group-Level Effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 42th Annual Meeting of the Cognitive Science Society - Developing a Mind: Learning in Humans, Animals, and Machines, CogSci 2020, virtual, July 29 - August 1, 2020, 2020, cognitivesciencesociety.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Tasuku Narita, Fuyuki Kitagawa, Yusuke Yoshida, Keisuke Tanaka |
Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings, pp. 16-39, 2020, Springer, 978-3-030-68889-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan |
Non-malleability Against Polynomial Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![In: Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III, pp. 97-126, 2020, Springer, 978-3-030-56876-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Pratik Soni |
Transforming Pseudorandomness and Non-malleability with Minimal Overheads. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
21 | Christian Majenz, Christian Schaffner, Jeroen van Wier |
Non-malleability for quantum public-key encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1905.05490, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
21 | Luis Dieulefait, Jorge Jiménez Urroz |
Factorization and malleability of RSA modules, and counting points on elliptic curves modulo N. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1911.11004, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|