Sciweavers

300 search results - page 24 / 60
» Compiling Erlang to Scheme
Sort
View
117
Voted
TCC
2007
Springer
145views Cryptology» more  TCC 2007»
15 years 9 months ago
(Password) Authenticated Key Establishment: From 2-Party to Group
Abstract. A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment...
Michel Abdalla, Jens-Matthias Bohli, Maria Isabel ...
127
Voted
LISP
2008
104views more  LISP 2008»
15 years 3 months ago
Flattening tuples in an SSA intermediate representation
For functional programs, unboxing aggregate data structures such as tuples removes memory indirections and frees dead components of the decoupled structures. To explore the consequ...
Lukasz Ziarek, Stephen Weeks, Suresh Jagannathan
141
Voted
IACR
2011
132views more  IACR 2011»
14 years 3 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
158
Voted
PLDI
2011
ACM
14 years 6 months ago
Evaluating value-graph translation validation for LLVM
Translation validators are static analyzers that attempt to verify that program transformations preserve semantics. Normalizing translation validators do so by trying to match the...
Jean-Baptiste Tristan, Paul Govereau, Greg Morrise...
165
Voted

Publication
237views
14 years 5 months ago
Estimation of behavioral user state based on eye gaze and head pose—application in an e-learning environment
Most e-learning environments which utilize user feedback or profiles, collect such information based on questionnaires, resulting very often in incomplete answers, and sometimes de...
Stylianos Asteriadis, Paraskevi Tzouveli, Kostas K...