The best practical algorithm for class group computations in imaginary quadratic number fields (such as group structure, class number, discrete logarithm computations) is a varian...
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
In this paper we propose a framework for the computational extraction of time characteristics of a single choreographic work. Computational frameworks can aid in revealing nonsali...
Vidyarani M. Dyaberi, Hari Sundaram, Thanassis Rik...
People often use computers other than their own to access web content, but blind users are restricted to using computers equipped with expensive, special-purpose screen reading pr...
Jeffrey P. Bigham, Craig Prince, Richard E. Ladner
Abstract. A significant effort has recently been made to rigorously relate the formal treatment of cryptography with the computational one. A first substantial step in this dire...