Filter
Conference contribution

Search results

  • 2024

    Cosystolic Expansion of Sheaves on Posets with Applications to Good 2-Query Locally Testable Codes and Lifted Codes

    First, U. A. & Kaufman, T., 10 Jun 2024, STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing. Mohar, B., Shinkar, I. & O�Donnell, R. (eds.). Association for Computing Machinery, p. 1446-1457 12 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Exterior Corners on Bargraphs of Motzkin Words

    Mansour, T. & Ramírez, J. L., 2024, Combinatorics, Graph Theory and Computing - SEICCGTC 2021. Hoffman, F., Holliday, S., Rosen, Z., Shahrokhi, F. & Wierman, J. (eds.). Springer, p. 355-367 13 p. (Springer Proceedings in Mathematics and Statistics; vol. 448).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Highly versal torsors

    First, U. A., 2024, Amitsur Centennial Symposium, 2021. Mann, A., Rowen, L. H., Saltman, D. J., Shalev, A., Small, L. W. & Vishne, U. (eds.). American Mathematical Society, p. 129-174 46 p. (Contemporary Mathematics; vol. 800).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Per-RMAP: Feasibility-Seeking and Superiorization Methods for Floorplanning with I/O Assignment

    Yu, S., Censor, Y., Jiang, M. & Luo, G., May 2023, 2023 International Symposium of Electronics Design Automation, ISEDA 2023. Institute of Electrical and Electronics Engineers Inc., p. 286-291 6 p. (2023 International Symposium of Electronics Design Automation, ISEDA 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Refined Coxeter polynomials

    Ladkani, S., Nov 2023, Representations of Algebras and Related Structures: International Conference on Representations of Algebras, ICRA 2020, 9–25 November 2020. Buan, A. B., Krause, H. & Solberg, Ø. (eds.). Berlin: EMS Press, p. 305–334 (EMS Series of Congress Reports).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Cardinality Constrained Scheduling in Online Models

    Epstein, L., Lassota, A., Levin, A., Maack, M. & Rohwedder, L., 1 Mar 2022, 39th International Symposium on Theoretical Aspects of Computer Science, STACS 2022. Berenbrink, P. & Monmege, B. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 28. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 219).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Counting Homomorphic Cycles in Degenerate Graphs

    Gishboliner, L., Levanzov, Y., Shapira, A. & Yuster, R., 2022, ACM-SIAM Symposium on Discrete Algorithms, SODA 2022. Association for Computing Machinery, p. 417-430 14 p. (Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms; vol. 2022-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Lower Bounds on the Performance of Online Algorithms for Relaxed Packing Problems

    Balogh, J., Dósa, G., Epstein, L. & Jeż, Ł., 2022, Combinatorial Algorithms - 33rd International Workshop, IWOCA 2022, Proceedings. Bazgan, C. & Fernau, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 101-113 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13270 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Binding BIKE Errors to a Key Pair

    Drucker, N., Gueron, S. & Kostic, D., 2021, Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings. Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 275-281 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Online Bin Packing of Squares and Cubes

    Epstein, L. & Mualem, L., 2021, Algorithms and Data Structures - 17th International Symposium, WADS 2021, Proceedings. Lubiw, A. & Salavatipour, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 357-370 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12808 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Revisiting the Security of COMET Authenticated Encryption Scheme

    Gueron, S., Jha, A. & Nandi, M., 2021, Progress in Cryptology – INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, 2021, Proceedings. Adhikari, A., Küsters, R. & Preneel, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-25 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13143 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Several Methods of Analysis for Cardinality Constrained Bin Packing

    Epstein, L., 2021, Approximation and Online Algorithms - 19th International Workshop, WAOA 2021, Revised Selected Papers. Koenemann, J. & Peis, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 117-129 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12982 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Speed Up Over the Rainbow

    Drucker, N., Gueron, S. & Latifi, S. (Editor), 2021, ITNG 2021 18th International Conference on Information Technology-New Generations. p. 131-136 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Truly asymptotic lower bounds for online vector bin packing

    Balogh, J., Cohen, I. R., Epstein, L. & Levin, A., 1 Sep 2021, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2021. Wootters, M. & Sanita, L. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 8. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 207).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    A New Lower Bound for Classic Online Bin Packing

    Balogh, J., Békési, J., Dósa, G., Epstein, L. & Levin, A., 2020, Approximation and Online Algorithms - 17th International Workshop, WAOA 2019, Revised Selected Papers. Bampis, E. & Megow, N. (eds.). Springer, p. 18-28 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11926 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography

    Drucker, N., Gueron, S. & Kostic, D., 2020, Cyber Security Cryptography and Machine Learning - 4th International Symposium, CSCML 2020, Proceedings. Dolev, S., Weiss, G., Kolesnikov, V. & Lodha, S. (eds.). Springer, p. 110-127 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12161 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • IAXO-the future axion helioscope

    IAXO Collaboration, 2020, Proceedings of the 9th Patras Workshop on Axions, WIMPs and WISPs, PATRAS 2013. Uwe, O. & Pierre, S. (eds.). Verlag Deutsches Elektronen-Synchrotron, p. 115-118 4 p. (Proceedings of the 9th Patras Workshop on Axions, WIMPs and WISPs, PATRAS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Observations on the Performance of PQ KEMs

    Drucker, N. & Gueron, S., 2020, 17th International Conference on Information Technology–New Generations, ITNG 2020. Latifi, S. (ed.). Springer, p. 25-30 6 p. (Advances in Intelligent Systems and Computing; vol. 1134).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On Constant-Time QC-MDPC decoders with negligible failure rate

    Drucker, N., Gueron, S. & Kostic, D., 2020, Code-Based Cryptography - 8th International Workshop, CBCrypto 2020, Revised Selected Papers. Baldi, M., Santini, P. & Persichetti, E. (eds.). Springer, p. 50-79 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12087 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • QC-MDPC Decoders with Several Shades of Gray

    Drucker, N., Gueron, S. & Kostic, D., 2020, Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Proceedings. Ding, J. & Tillich, J.-P. (eds.). Springer, p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12100 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    Continuous key agreement with reduced bandwidth

    Drucker, N. & Gueron, S., 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 33-46 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Extremal Tetracyclic and Pentacyclic graphs on Geometric-Arithmetic index

    Elumalai, S. & Mansour, T., 2019, 19th Haifa Workshop on Interdisciplinary Applications of Graphs, Combinatorics, and Algorithms.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Extremal Tetracyclic graphs on certain vertex based topological indices

    Elumalai, S. & Mansour, T., 2019, National Conference on Differential Equations and Dynamical Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast constant time implementations of ZUC-256 on x86 CPUs

    Drucker, N. & Gueron, S., 25 Feb 2019, 2019 16th IEEE Annual Consumer Communications and Networking Conference, CCNC 2019. Institute of Electrical and Electronics Engineers Inc., 8651851. (2019 16th IEEE Annual Consumer Communications and Networking Conference, CCNC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast modular squaring with AVX512IFMA

    Drucker, N. & Gueron, S., 2019, 16th International Conference on Information Technology-New Generations, ITNG 2019. Latif, S. (ed.). Springer, p. 3-8 6 p. (Advances in Intelligent Systems and Computing; vol. 800 Part F1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Generating a random string with a fixed weight

    Drucker, N. & Gueron, S., 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 141-155 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Making AES great again: The forthcoming vectorized AES instruction

    Drucker, N., Gueron, S. & Krasnov, V., 2019, 16th International Conference on Information Technology-New Generations, ITNG 2019. Latif, S. (ed.). Springer, p. 37-41 5 p. (Advances in Intelligent Systems and Computing; vol. 800 Part F1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Online bin covering with limited migration

    Berndt, S., Epstein, L., Jansen, K., Levin, A., Maack, M. & Rohwedder, L., Sep 2019, 27th Annual European Symposium on Algorithms, ESA 2019. Bender, M. A., Svensson, O. & Herman, G. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 18:1–18:14 18. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 144).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On the Security of COMET Authenticated Encryption Scheme

    Gueron, S., Jha, A. & Nandi, M., 2019, NIST Lightweight Workshop ’19. (Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The advantage of truncated permutations

    Gilboa, S. & Gueron, S., 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 111-120 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    A new and improved algorithm for online bin packing

    Balogh, J., Békési, J., Dósa, G., Epstein, L. & Levin, A., 1 Aug 2018, 26th European Symposium on Algorithms, ESA 2018. Bast, H., Herman, G. & Azar, Y. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 5:1– 5:14 (Leibniz International Proceedings in Informatics, LIPIcs; vol. 112).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cryptosystems with a multi prime composite modulus

    Gueron, S. & Drucker, N., 16 Mar 2018, CCNC 2018 - 2018 15th IEEE Annual Consumer Communications and Networking Conference. Institute of Electrical and Electronics Engineers Inc., p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast multiplication of binary polynomials with the forthcoming vectorized VPCLMULQDQ instruction

    Drucker, N., Gueron, S. & Krasnov, V., 13 Sep 2018, Proceedings of the 25th International Symposium on Computer Arithmetic, ARITH 2018. Institute of Electrical and Electronics Engineers Inc., p. 115-119 5 p. 8464777. (Proceedings - Symposium on Computer Arithmetic; vol. 2018-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Imbedding statistics for linear families via Markov chains

    Gross, J. L., Mansour, T. & Tucker, T. W., 2018, AMS National Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Lower bounds for several online variants of bin packing

    Balogh, J., Békési, J., Dósa, G., Epstein, L. & Levin, A., 2018, Approximation and Online Algorithms - 15th International Workshop, WAOA 2017, Revised Selected Papers. Solis-Oba, R. & Fleischer, R. (eds.). Springer Verlag, p. 102-117 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10787 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Software Optimizations for DES

    Gueron, S. & Shemy, R., 2018, Information Technology - New Generations - 15th International Conference on Information Technology. Latifi, S. (ed.). Springer Verlag, p. 133-138 6 p. (Advances in Intelligent Systems and Computing; vol. 738).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The Comeback of Reed Solomon Codes

    Drucker, N., Gueron, S. & Krasnov, V., 13 Sep 2018, Proceedings of the 25th International Symposium on Computer Arithmetic, ARITH 2018. Institute of Electrical and Electronics Engineers Inc., p. 125-129 5 p. 8464690. (Proceedings - Symposium on Computer Arithmetic; vol. 2018-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Two are better than one: Software optimizations for AES-GCM over short messages

    Gueron, S. & Shemy, R., 2018, Information Technology – New Generations - 14th International Conference on Information Technology. Latifi, S. (ed.). Springer Verlag, p. 187-191 5 p. (Advances in Intelligent Systems and Computing; vol. 558).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2017

    Batch coloring of graphs

    Boyar, J., Epstein, L., Favrholdt, L. M., Larsen, K. S. & Levin, A., 2017, Approximation and Online Algorithms - 14th International Workshop, WAOA 2016, Revised Selected Papers. Mastrolilli, M. & Jansen, K. (eds.). Springer Verlag, p. 52-64 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10138 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Better bounds for block cipher modes of operation via nonce-based key derivation

    Gueron, S. & Lindell, Y., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1019-1036 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • CAKE: Code-Based Algorithm for Key Encapsulation

    Barreto, P. S. L. M., Gueron, S., Güneysu, T., Misoczki, R., Persichetti, E., Sendrier, N. & Tillich, J. P., 2017, Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Proceedings. O’Neill, M. (ed.). Springer Verlag, p. 207-226 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10655 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Combining homomorphic encryption with trusted execution environment: A demonstration with paillier encryption and SGX

    Drucker, N. & Gueron, S., 30 Oct 2017, MIST 2017 - Proceedings of the 2017 International Workshop on Managing Insider Security Threats, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 85-88 4 p. (MIST 2017 - Proceedings of the 2017 International Workshop on Managing Insider Security Threats, co-located with CCS 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fault attacks on encrypted general purpose compute platforms

    Buhren, R., Gueron, S., Nordholz, J., Seifert, J. P. & Vetter, J., 22 Mar 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 197-204 8 p. (CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • From groups to clusters

    Ladkani, S., Jan 2017, Representation Theory – Current Trends and Perspectives. Krause, H., Littelmann, P., Malle, G., Neeb, K.-H. & Schweigert, C. (eds.). Berlin: EMS Press, p. 427–500 (EMS Series of Congress Reports).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Online bin packing with cardinality constraints resolved

    Balogh, J., Békési, J., Dósa, G., Epstein, L. & Levin, A., 1 Sep 2017, 25th European Symposium on Algorithms, ESA 2017. Sohler, C., Sohler, C. & Pruhs, K. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 10. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 87).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Paillier-encrypted databases with fast aggregated queries

    Drucker, N. & Gueron, S., 17 Jul 2017, 2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017. Institute of Electrical and Electronics Engineers Inc., p. 848-853 6 p. 7983244. (2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2016

    Accelerating Big Integer Arithmetic Using Intel IFMA Extensions

    Gueron, S. & Krasnov, V., 7 Sep 2016, Proceedings - 2016 IEEE 23rd Symposium on Computer Arithmetic, ARITH 2016. Hormigo, J., Revol, N., Montuschi, P., Oberman, S. & Schulte, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 32-38 7 p. 7563269. (Proceedings - Symposium on Computer Arithmetic; vol. 2016-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Attacks on Encrypted Memory and Constructions for Memory Protection

    Gueron, S., 5 Dec 2016, Proceedings - 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016. Maurine, P. & Tunstall, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1-3 3 p. 7774476. (Proceedings - 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Blinded random corruption attacks

    Branco, R. & Gueron, S., 20 Jun 2016, Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016. Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7495562. (Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • B–Orbits in Abelian Nilradicals of types B,C and D: Towards a conjecture of Panyushev

    Barnea, N. & Melnikov, A., 2016, Lie Theory and Its Applications in Physics. Dobrev, V. (ed.). Springer New York LLC, p. 399-411 13 p. (Springer Proceedings in Mathematics and Statistics; vol. 191).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review