Avishai Wool

From MaRDI portal
(Redirected from Person:293248)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Fast analytical rank estimation
Constructive Side-Channel Analysis and Secure Design
2023-10-20Paper
Optimal layouts on a chain ATM network
Lecture Notes in Computer Science
2023-05-08Paper
Crumbling walls: a class of practical and efficient quorum systems
Distributed Computing
2020-12-02Paper
Poly-logarithmic side channel rank estimation via exponential sampling2020-01-28Paper
Sliding-window correlation attacks against encryption devices with an unstable clock2019-02-20Paper
Cache-attacks on the ARM trustzone implementations of AES-256 and AES-256-GCM via GPU-based analysis2019-02-20Paper
Crumbling walls
Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing - PODC '95
2017-09-29Paper
The load and availability of Byzantine quorum systems
Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97
2017-09-29Paper
Side-channel cryptographic attacks using pseudo-Boolean optimization
Constraints
2017-08-16Paper
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Optimal availability quorum systems: theory and practice
Information Processing Letters
2016-06-09Paper
How to be an efficient snoop, or the probe complexity of quorum systems (extended abstract)
Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing - PODC '96
2015-09-11Paper
A new framework for constraint-based probabilistic template side channel attacks
Advanced Information Systems Engineering
2015-07-21Paper
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Algebraic side-channel analysis in the presence of errors
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Finding a dense-core in jellyfish graphs
Computer Networks
2009-01-20Paper
Bounding the bias of tree-like sampling in IP topologies
Networks and Heterogeneous Media
2008-07-29Paper
Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s
Lecture Notes in Computer Science
2008-06-17Paper
Finding a Dense-Core in Jellyfish Graphs
Algorithms and Models for the Web-Graph
2008-04-11Paper
A geographic directed preferential internet topology model
Computer Networks
2007-09-03Paper
scientific article; zbMATH DE number 2102679 (Why is no real title available?)2004-09-24Paper
Combinatorial design of multi-ring networks with combined routing and flow control.
Computer Networks
2003-08-07Paper
Probabilistic quorum systems
Information and Computation
2003-01-14Paper
How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems
SIAM Journal on Discrete Mathematics
2003-01-05Paper
scientific article; zbMATH DE number 1759788 (Why is no real title available?)2002-10-07Paper
scientific article; zbMATH DE number 1408379 (Why is no real title available?)2002-05-14Paper
The Load and Availability of Byzantine Quorum Systems
SIAM Journal on Computing
2000-10-18Paper
scientific article; zbMATH DE number 1303136 (Why is no real title available?)1999-06-17Paper
Computational experience with approximation algorithms for the set covering problem
European Journal of Operational Research
1999-02-28Paper
The Load, Capacity, and Availability of Quorum Systems
SIAM Journal on Computing
1998-05-10Paper
Optimal layouts on a chain ATM network
Discrete Applied Mathematics
1998-01-01Paper
Randomized approximation of bounded multicovering problems
Algorithmica
1997-10-29Paper
The availability of crumbling wall quorum systems
Discrete Applied Mathematics
1997-10-09Paper
The availability of quorum systems
Information and Computation
1996-02-26Paper


Research outcomes over time


This page was built for person: Avishai Wool