We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, ...
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Ca...
Though verification tools are finding industrial use, the utility of engineering optimizations that make them scalable and usable is not widely known. Despite the fact that seve...
Incorporating faces into mediated discussions is a complex design problem. The face conveys social and personal identity; it reports fleeting changes of emotion and the cumulative ...
High-accuracy PDE solvers use multi-dimensional fast Fourier transforms. The FFTs exhibits a static and structured memory access pattern which results in a large amount of communic...
Secondary school students, when investigating tertiary study, have little opportunity to discover what a particular course has to offer and often have a poor understanding of empl...