Author of the publication

Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.

, , , , and . IEEE Symposium on Security and Privacy, page 1202-1219. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simple High-Level Code For Cryptographic Arithmetic: With Proofs, Without Compromises., , , , and . ACM SIGOPS Oper. Syst. Rev., 54 (1): 23-30 (2020)Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises., , , , and . IEEE Symposium on Security and Privacy, page 1202-1219. IEEE, (2019)Computing Curricula~2001 -- DRAFT -- (March~6, 2000) Report of the ACM/IEEE-CS Joint Curriculum Task Force, , , , , , , , , and 7 other author(s). http://www.computer.org/education/cc2001/ report/index.html, (March 2000)The Power of Self-Directed Learning., and . Mach. Learn., 14 (1): 271-294 (1994)The inverse protein folding problem on 2D and 3D lattices, , , , , and . Discrete Applied Mathematics, 155 (6-7): 719-732 (2007)Theory revision with queries: Horn, read-once, and parity formulas., , , and . Artif. Intell., 156 (2): 139-176 (2004)Hydras: Directed hypergraphs and Horn formulas., , and . Theor. Comput. Sci., (2017)Who is watching you eat?: a noir preferences thriller., , and . AI Matters, 1 (4): 13-22 (2015)On Theory Revision with Queries., and . COLT, page 41-52. ACM, (1999)New Revision Algorithms., , , and . ALT, volume 3244 of Lecture Notes in Computer Science, page 395-409. Springer, (2004)