Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Prover'
Prover published presentations and documents on DocSlides.
(Implementations of)
by conchita-marotz
verifiable computation and. succinct arguments:. ...
Efficient Zero-Knowledge Argument for Correctness of a Shuf
by phoebe-click
Stephanie Bayer. University College London. Jens ...
Quantum Proofs of Knowledge
by pamella-moone
Dominique Unruh. University of Tartu. Tartu, Apri...
Slender PUF Protocol
by mitsue-stanley
Authentication . by Substring Matching. M. Majzoo...
Omer Paneth and Guy
by tawny-fly
Rothblum. Publicly . Verifiable Non-Interactive A...
Slender PUF Protocol
by jane-oiler
Authentication . by Substring Matching. M. Majzoo...
How to Delegate Computations:
by luanne-stotts
The . Power . of No-Signaling . Proofs. Ron . Rot...
Efficient Zero-Knowledge Argument for Correctness of a Shuffle
by marina-yarberry
Stephanie Bayer. University College London. Jens ...
Based on Powerpoint
by myesha-ticknor
Based on Powerpoint slides by Giorgi Japarid...
Based on Powerpoint
by kittie-lecroy
Based on Powerpoint slides by Giorgi Japarid...
Interpolants
by conchita-marotz
from Z3 proofs. Ken McMillan. Microsoft Research...
Alternation for Termination
by conchita-marotz
William Harris. , . Akash. . Lal. , . Aditya. ....
Interpolants
by pasty-toler
from Z3 proofs. Ken McMillan. Microsoft Research...
Proof translation and SMT LIB certification
by myesha-ticknor
Yeting. . Ge. Clark Barrett. SMT . 2008. July...
Distance-Bounding and its Applications
by test
Relay attacks, distance-bounding, . mafiosi. &am...
Eli Ben-
by natalia-silvester
Sasson. , Alessandro . Chiesa. , . Eran. . Trome...
COMS E6261 Advanced Cryptography:
by min-jolicoeur
Minimalist Cryptography. Spring 2016, Lecture 5 ....
COMS E6261 Advanced Cryptography:
by marina-yarberry
Minimalist Cryptography. Spring 2016, Lecture 5 ....
Two Query PCP with
by karlyn-bohler
Sub-constant Error. Dana . Moshkovitz. Princeton ...
Smart Phones
by kittie-lecroy
Edgardo Vega. Usable Security – CS 6204 – Fal...
1. Non-Technical: advice and critique
by pamella-moone
2. Technical: On Doubly-Efficient . Interact...
Secure Authentication in the
by tatiana-dople
Grid. ESORICS, September 2017. Cas Cremers, . Mar...
Verifiable Databases and RAM Programs
by pamella-moone
Yupeng. Zhang. , Daniel . Genkin. , Jonathan Kat...
Using the Coq theorem prover
by min-jolicoeur
to verify complex data structure invariants. Ken...
Probabilistic Proof System
by min-jolicoeur
Probabilistic Proof System ...
Probabilistic Proof System
by min-jolicoeur
— . An Introduction. ...
Will You Still Compile Me Tomorrow
by friendma
?. Static . Cross-Version Compiler . Validation. C...
Efficient Zero-Knowledge Proofs
by jubilantbikers
Jens Groth. University College London. Zero-knowle...
Non-interactive zero-knowledge
by rouperli
with . quantum random oracles. Dominique Unruh. Un...
CDN16 is a multi run panelmounted 31ow computer designed for high acc
by alis
The CDN16 is designed for reliability in high-end ...
ProtoStar: Generic Efficient IVC Schemes
by smith
Benedikt Bünz. Binyi Chen. NYU, Espresso Systems...
Endangered Patna Actaea
by dean551
Presented by- ...
Load More...