Publication | Date of Publication | Type |
---|
Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits | 2023-08-03 | Paper |
k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-election Audits | 2023-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q5871911 | 2023-01-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q5075309 | 2022-05-12 | Paper |
Optimality of Correlated Sampling Strategies | 2020-12-17 | Paper |
Leading the field: fortune favors the bold in Thurstonian choice models | 2019-01-28 | Paper |
Time-Space Trade-offs in Population Protocols | 2018-07-16 | Paper |
RSA Chips (Past/Present/Future) (Extended abstract) | 2018-07-11 | Paper |
All-or-nothing encryption and the package transform | 2018-05-09 | Paper |
On the Design and Security of RC2 | 2018-05-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4608043 | 2018-03-15 | Paper |
A “Paradoxical” Solution to The Signature Problem | 2017-04-10 | Paper |
Picture-hanging puzzles | 2015-01-21 | Paper |
The subgraph homeomorphism problem | 2014-03-14 | Paper |
Coping with errors in binary search procedures (Preliminary Report) | 2014-03-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q2865939 | 2013-12-12 | Paper |
\texttt{FlipIt}: the game of ``stealthy takeover | 2013-11-15 | Paper |
Defending against the Unknown Enemy: Applying FlipIt to System Security | 2013-03-13 | Paper |
Tweakable block ciphers | 2012-09-21 | Paper |
The invertibility of the XOR of rotations of a binary word | 2011-04-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q3066732 | 2011-01-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3651735 | 2009-12-11 | Paper |
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 | 2009-08-11 | Paper |
Theory of Cryptography | 2009-05-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q3619797 | 2009-04-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3619798 | 2009-04-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3619846 | 2009-04-09 | Paper |
Amplifying Collision Resistance: A Complexity-Theoretic Treatment | 2009-03-10 | Paper |
On the notion of ‘software independence’ in voting systems | 2009-01-21 | Paper |
Lightweight Email Signatures (Extended Abstract) | 2008-11-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4739521 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4474199 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472072 | 2004-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472077 | 2004-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409107 | 2003-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4706390 | 2003-06-15 | Paper |
Piecemeal graph exploration by a mobile robot. | 2003-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4949336 | 2002-12-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q2747613 | 2001-10-14 | Paper |
Permutation polynomials modulo \(2^w\) | 2001-08-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249327 | 2000-10-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941798 | 2000-07-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4484898 | 2000-06-05 | Paper |
Translucent cryptography -- an alternative to key escrow, and its implementation via fractional oblivious transfer | 2000-02-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4385518 | 1998-05-04 | Paper |
On breaking a Huffman code | 1996-07-31 | Paper |
Diversity-based inference of finite automata | 1995-09-10 | Paper |
A formal model of hierarchical concept learning | 1995-05-01 | Paper |
Complete variable-length ``fix-free codes | 1995-02-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314055 | 1995-01-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314049 | 1994-11-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279583 | 1994-09-20 | Paper |
On choosing between experimenting and thinking when learning | 1994-06-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279609 | 1994-02-17 | Paper |
Learning Binary Relations and Total Orders | 1993-12-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3140418 | 1993-12-15 | Paper |
Inference of finite automata using homing sequences | 1993-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4013558 | 1992-09-27 | Paper |
Results on learnability and the Vapnik-Chervonenkis dimension | 1991-01-01 | Paper |
Inferring decision trees using the minimum description length principle | 1989-01-01 | Paper |
A knapsack-type public key cryptosystem based on arithmetic in finite fields | 1989-01-01 | Paper |
Game tree searching by min/max approximation | 1988-01-01 | Paper |
Is the data encryption standard a group? (Results of cycling experiments on DES) | 1988-01-01 | Paper |
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q5203708 | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q5753361 | 1988-01-01 | Paper |
Global wire routing in two-dimensional arrays | 1987-01-01 | Paper |
Network control by Bayesian broadcast | 1987-01-01 | Paper |
Efficient Factoring Based on Partial Information | 1986-01-01 | Paper |
Is the Data Encryption Standard a Group? (Preliminary Abstract) | 1986-01-01 | Paper |
Estimating a probability using finite memory | 1986-01-01 | Paper |
A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields (preliminary draft) | 1985-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3322997 | 1983-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3671039 | 1983-01-01 | Paper |
How to reuse a “write-once≓ memory | 1982-01-01 | Paper |
The subgraph homeomorphism problem | 1980-01-01 | Paper |
Coping with errors in binary search procedures | 1980-01-01 | Paper |
On the Polyhedral Decision Problem | 1980-01-01 | Paper |
Orthogonal Packings in Two Dimensions | 1980-01-01 | Paper |
An \(\Omega((n/lg\,n)^{1/2})\) lower bound on the number of additions necessary to compute 0-1 polynomials over the ring of integer polynomials | 1979-01-01 | Paper |
Critical remarks on “Critical Remarks on Some Public-Key Cryptosystems” by T. Herlestam | 1979-01-01 | Paper |
A method for obtaining digital signatures and public-key cryptosystems | 1978-01-01 | Paper |
Optimal Arrangement of Keys in a Hash Table | 1978-01-01 | Paper |
k + 1 Heads Are Better than k | 1978-01-01 | Paper |
On recognizing graph properties from adjacency matrices | 1977-01-01 | Paper |
The game of \(N\) questions of a tree | 1977-01-01 | Paper |
On the Worst-Case Behavior of String-Searching Algorithms | 1977-01-01 | Paper |
Constructing optimal binary decision trees is NP-complete | 1976-01-01 | Paper |
Linear expected time of a simple union-find algorithm | 1976-01-01 | Paper |
On self-organizing sequential search heuristics | 1976-01-01 | Paper |
Partial-Match Retrieval Algorithms | 1976-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4131017 | 1976-01-01 | Paper |
Expected time bounds for selection | 1975-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4133137 | 1975-01-01 | Paper |
Asymptotic bounds for the number of convex \(n\)-ominoes | 1974-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4048576 | 1974-01-01 | Paper |
Time bounds for selection | 1973-01-01 | Paper |
A Procedure for Improving the Upper Bound for the Number of n-Ominoes | 1973-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4125778 | 1972-01-01 | Paper |