Browse Publications

  1. 2021
  2. Publications content icon
    Published

    On index calculus algorithms for subfield curves

    Christophe Petit, 21 Jul 2021, Selected Areas in Cryptography - 27th International Conference, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Springer, p. 115-138 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12804).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Publications content icon
    Published

    Trapdoor DDH groups from pairings and isogenies

    Peter Kutas, Christophe Petit & , 21 Jul 2021, Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Springer, p. 431-450 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Publications content icon
    Published

    SimS: a simplification of SiGamal

    Christophe Petit, 15 Jul 2021, Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings. Cheon, J. H. & Tillich, J-P. (eds.). Springer, p. 277-295 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Publications content icon
    Published

    Under the hood of SYCL – an initial performance analysis with an unstructured-mesh CFD application

    Stephen Jarvis & , 17 Jun 2021, High Performance Computing: 36th International Conference, ISC High Performance 2021, Virtual Event, June 24 – July 2, 2021, Proceedings. Chamberlain, B. L., Varbanescu, A-L., Ltaief, H. & Luszczek, P. (eds.). 1 ed. Springer, p. 391-410 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12728).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Publications content icon
    Published

    One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols

    Peter Kutas, , Christophe Petit & , 16 Jun 2021, Advances in Cryptology – EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I. Canteaut, A. & Standaert, F-X. (eds.). Springer, p. 242-271 30 p. (Lecture Notes in Computer Science; vol. 12696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Publications content icon
    Published

    SAFA: a semi-asynchronous protocol for fast federated learning with low overhead

    Stephen Jarvis, 1 May 2021, In: IEEE Transactions on Computers. 70, 5, p. 655-668 14 p., 9093123.

    Research output: Contribution to journalArticlepeer-review

  8. Publications content icon
    E-pub ahead of print

    Quantitative verification of Kalman filters

    Alexandros Evangelidis & David Parker, 5 Feb 2021, (E-pub ahead of print) In: Formal Aspects of Computing.

    Research output: Contribution to journalArticlepeer-review

  9. Publications content icon
    Published

    Improved Torsion-Point Attacks on SIDH Variants

    Peter Kutas, , , , Christophe Petit & , 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 432-470 39 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12827 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. 2020
  11. Publications content icon
    Published

    Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems

    Richard J Thomas & Tom Chothia, 17 Dec 2020, Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, 2020, Revised Selected Papers. Katsikas, S., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A., Gritzalis, S., Meng, W. & Furnell, S. (eds.). Springer, p. 100-116 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12501 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Publications content icon
    Published

    Parallel design of sparse deep belief network with multi-objective optimization

    Naresh Marturi, Sep 2020, In: Information Sciences. 533, p. 24-42 19 p.

    Research output: Contribution to journalArticlepeer-review

  13. Publications content icon
    Published

    Improving sampling in evolution strategies through mixture-based distributions built from past problem instances

    Stephen Friess, Peter Tino, , & Xin Yao, 31 Aug 2020, Parallel Problem Solving from Nature – PPSN XVI. Springer, p. 583-596 14 p. (Lecture Notes in Computer Science; vol. 12269).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Publications content icon
    Published

    An unstructured CFD mini-application for the performance prediction of a production CFD code

    Stephen Jarvis, 25 May 2020, In: Concurrency Computation. 32, 10, e5443.

    Research output: Contribution to journalArticlepeer-review

  15. Publications content icon
    E-pub ahead of print

    Endogenous Queue Number Determination in G/M/s Systems

    Vasco Alves, 17 Apr 2020, (E-pub ahead of print) In: 4OR.

    Research output: Contribution to journalArticlepeer-review

  16. Publications content icon
    Published
  17. Publications content icon
    Published

    Combining character and word embeddings for affect in arabic informal social media microblogs

    Mark Lee, 2020, Natural Language Processing and Information Systems - 25th International Conference on Applications of Natural Language to Information Systems, NLDB 2020, Proceedings. Métais, E., Meziane, F., Horacek, H. & Cimiano, P. (eds.). Springer Vieweg, p. 213-224 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12089 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Publications content icon
    Published

    HEAT: Hyperbolic Embedding of Attributed Networks

    Shan He, 2020, Intelligent Data Engineering and Automated Learning – IDEAL 2020 - 21st International Conference, 2020, Proceedings. Analide, C., Novais, P., Camacho, D. & Yin, H. (eds.). Springer, p. 28-40 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12489 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Publications content icon
    Published

    On adaptive attacks against jao-urbanik’s isogeny-based protocol

    Peter Kutas, , Christophe Petit & , 2020, Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Proceedings. Nitaj, A. & Youssef, A. (eds.). Springer Vieweg, p. 195-213 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Publications content icon
    Published

    Pairwise Learning to Rank by Neural Networks Revisited: Reconstruction, Theoretical Analysis and Practical Performance

    Andreas Karwath & , 2020, Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2019, Proceedings. Brefeld, U., Fromont, E., Hotho, A., Knobbe, A., Maathuis, M. & Robardet, C. (eds.). Springer Vieweg, p. 237-252 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11908 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Publications content icon
    Published

    SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies

    Christophe Petit & , 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). Springer, p. 64-93 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12491 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Publications content icon
    Published

    Semi-commutative masking: A framework for isogeny-based protocols, with an application to fully secure two-round isogeny-based OT

    Christophe Petit & , 2020, Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings. Krenn, S., Shulman, H. & Vaudenay, S. (eds.). Springer, p. 235-258 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12579 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...13 Next