-
1
-
-
84877686573
-
-
CUDA (http://developer.nvidia.com/what-cuda).
-
CUDA
-
-
-
3
-
-
84877699516
-
-
Shootout/Fannkuch. http://www.haskell.org/haskellwiki/Shootout/Fannkuch.
-
Shootout/Fannkuch
-
-
-
4
-
-
0037995929
-
SETI@home: An Experiment in Public-Resource Computing
-
DOI 10.1145/581571.581573
-
D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer. SETI@home: An experiment in public-resource computing. CACM, 45(11):56-61, Nov. 2002. (Pubitemid 135702626)
-
(2002)
Communications of the ACM
, vol.45
, Issue.11
, pp. 56-61
-
-
Anderson, D.P.1
Cobb, J.2
Korpela, E.3
Lebofsky, M.4
Werthimer, D.5
-
6
-
-
0032058198
-
Proof Verification and the Hardness of Approximation Problems
-
S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hardness of approximation problems. J. of the ACM, 45(3):501-555, May 1998. (Pubitemid 128506634)
-
(1998)
Journal of the ACM
, vol.45
, Issue.3
, pp. 501-555
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
7
-
-
0031651077
-
Probabilistic checking of proofs: A new characterization of NP
-
S. Arora and S. Safra. Probabilistic checking of proofs: a new characterization of NP. J. of the ACM, 45(1):70-122, Jan. 1998. (Pubitemid 128615465)
-
(1998)
Journal of the ACM
, vol.45
, Issue.1
, pp. 70-122
-
-
Arora, S.1
Safra, S.2
-
9
-
-
84873389393
-
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems
-
E. Ben-Sasson, A. Chiesa, D. Genkin, and E. Tromer. Fast reductions from RAMs to delegatable succinct constraint satisfaction problems. In ITCS, 2013.
-
(2013)
ITCS
-
-
Ben-Sasson, E.1
Chiesa, A.2
Genkin, D.3
Tromer, E.4
-
10
-
-
84879809515
-
On the concrete-efficiency threshold of probabilistically-checkable proofs
-
To appear
-
E. Ben-Sasson, A. Chiesa, D. Genkin, and E. Tromer. On the concrete-efficiency threshold of probabilistically-checkable proofs. In STOC, 2013. To appear.
-
(2013)
STOC
-
-
Ben-Sasson, E.1
Chiesa, A.2
Genkin, D.3
Tromer, E.4
-
11
-
-
27644561824
-
Short PCPs verifiable in polylogarithmic time
-
E. Ben-Sasson, O. Goldreich, P. Harsha, M. Sudan, and S. Vadhan. Short PCPs verifiable in polylogarithmic time. In Conference on Computational Complexity (CCC), 2005.
-
Conference on Computational Complexity (CCC), 2005
-
-
Ben-Sasson, E.1
Goldreich, O.2
Harsha, P.3
Sudan, M.4
Vadhan, S.5
-
12
-
-
55249095082
-
Short PCPs with polylog query complexity
-
May
-
E. Ben-Sasson and M. Sudan. Short PCPs with polylog query complexity. SIAM J. on Comp., 38(2):551-607, May 2008.
-
(2008)
SIAM J. on Comp.
, vol.38
, Issue.2
, pp. 551-607
-
-
Ben-Sasson, E.1
Sudan, M.2
-
14
-
-
4944240756
-
Barycentric Lagrange interpolation
-
J.-P. Berrut and L. N. Trefethen. Barycentric Lagrange interpolation. SIAM Review, 46(3):501-517, 2004.
-
(2004)
SIAM Review
, vol.46
, Issue.3
, pp. 501-517
-
-
Berrut, J.-P.1
Trefethen, L.N.2
-
15
-
-
84879803964
-
Succinct non-interactive arguments via linear interactive proofs
-
Mar.
-
N. Bitansky, A. Chiesa, Y. Ishai, R. Ostrovsky, and O. Paneth. Succinct non-interactive arguments via linear interactive proofs. In IACR TCC, Mar. 2013.
-
(2013)
IACR TCC
-
-
Bitansky, N.1
Chiesa, A.2
Ishai, Y.3
Ostrovsky, R.4
Paneth, O.5
-
18
-
-
79957455464
-
Fail-aware untrusted storage
-
Apr.
-
C. Cachin, I. Keidar, and A. Shraer. Fail-aware untrusted storage. SIAM J. on Comp., 40(2):493-533, Apr. 2011.
-
(2011)
SIAM J. on Comp.
, vol.40
, Issue.2
, pp. 493-533
-
-
Cachin, C.1
Keidar, I.2
Shraer, A.3
-
19
-
-
0345757358
-
Practical Byzantine Fault Tolerance and Proactive Recovery
-
DOI 10.1145/571637.571640
-
M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. on Comp. Sys., 20(4):398-461, Nov. 2002. (Pubitemid 135702591)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
20
-
-
84877723204
-
Improved delegation of computation using fully homomorphic encryption
-
K.-M. Chung, Y. Kalai, and S. Vadhan. Improved delegation of computation using fully homomorphic encryption. In CRYPTO 2010.
-
CRYPTO 2010
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
21
-
-
84968470212
-
An algorithm for the machine calculation of complex fourier series
-
J. W. Cooley and J. W. Tukey. An algorithm for the machine calculation of complex fourier series. Mathematics of Computation, 19(90):297-301, 1965.
-
(1965)
Mathematics of Computation
, vol.19
, Issue.90
, pp. 297-301
-
-
Cooley, J.W.1
Tukey, J.W.2
-
23
-
-
84856468957
-
Practical verified computation with streaming interactive proofs
-
G. Cormode, M. Mitzenmacher, and J. Thaler. Practical verified computation with streaming interactive proofs. In ITCS, 2012.
-
(2012)
ITCS
-
-
Cormode, G.1
Mitzenmacher, M.2
Thaler, J.3
-
24
-
-
34250354807
-
The PCP theorem by gap amplification
-
June
-
I. Dinur. The PCP theorem by gap amplification. J. of the ACM, 54(3), June 2007.
-
(2007)
J. of the ACM
, vol.54
, Issue.3
-
-
Dinur, I.1
-
25
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Info. Theory, 31(4):469-472, 1985.
-
(1985)
IEEE Trans. on Info. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
26
-
-
79960854270
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, 2010.
-
(2010)
CRYPTO
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
27
-
-
84889679875
-
Quadratic span programs and succinct NIZKs without PCPs
-
Report 2012/215, 2012. To appear in EUROCRYPT 2013
-
R. Gennaro, C. Gentry, B. Parno, and M. Raykova. Quadratic span programs and succinct NIZKs without PCPs. Cryptology ePrint Archive, Report 2012/215, 2012. To appear in EUROCRYPT 2013.
-
Cryptology ePrint Archive
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
Raykova, M.4
-
29
-
-
84865663852
-
Homomorphic evaluation of the AES circuit
-
C. Gentry, S. Halevi, and N. Smart. Homomorphic evaluation of the AES circuit. In CRYPTO, 2012.
-
(2012)
CRYPTO
-
-
Gentry, C.1
Halevi, S.2
Smart, N.3
-
30
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. Delegating computation: Interactive proofs for muggles. In STOC, 2008.
-
(2008)
STOC
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
31
-
-
79952505412
-
Short pairing-based non-interactive zero-knowledge arguments
-
J. Groth. Short pairing-based non-interactive zero-knowledge arguments. In ASIACRYPT, 2010.
-
(2010)
ASIACRYPT
-
-
Groth, J.1
-
32
-
-
58049120018
-
PeerReview: Practical accountability for distributed systems
-
A. Haeberlen, P. Kouznetsov, and P. Druschel. PeerReview: Practical accountability for distributed systems. In SOSP, 2007.
-
(2007)
SOSP
-
-
Haeberlen, A.1
Kouznetsov, P.2
Druschel, P.3
-
34
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments
-
extended abstract
-
J. Kilian. A note on efficient zero-knowledge proofs and arguments (extended abstract). In STOC, 1992.
-
(1992)
STOC
-
-
Kilian, J.1
-
35
-
-
0006740356
-
Seminumerical Algorithms
-
Addison-Wesley, third edition
-
D. E. Knuth. Seminumerical Algorithms, volume 2 of The Art of Computer Programming. Addison-Wesley, third edition, 1997.
-
(1997)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.E.1
-
37
-
-
84877689990
-
Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments
-
H. Lipmaa. Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments. In IACR TCC, 2011.
-
(2011)
IACR TCC
-
-
Lipmaa, H.1
-
38
-
-
84863181209
-
Depot: Cloud storage with minimal trust
-
Dec.
-
P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud storage with minimal trust. ACM Trans. on Comp. Sys., 29(4), Dec. 2011.
-
(2011)
ACM Trans. on Comp. Sys.
, vol.29
, Issue.4
-
-
Mahajan, P.1
Setty, S.2
Lee, S.3
Clement, A.4
Alvisi, L.5
Dahlin, M.6
Walfish, M.7
-
39
-
-
80755168310
-
VMCrypt: Modular software architecture for scalable secure computation
-
L. Malka. VMCrypt: Modular software architecture for scalable secure computation. In ACM CCS, 2011.
-
(2011)
ACM CCS
-
-
Malka, L.1
-
41
-
-
0032306029
-
Byzantine quorum systems
-
D. Malkhi and M. Reiter. Byzantine quorum systems. Distributed Computing, 11(4):203-213, 1998. (Pubitemid 128489949)
-
(1998)
Distributed Computing
, vol.11
, Issue.4
, pp. 203-213
-
-
Malkhi, D.1
Reiter, M.2
-
43
-
-
85174664325
-
Distributed execution with remote audit
-
F. Monrose, P. Wycko, and A. D. Rubin. Distributed execution with remote audit. In NDSS, 1999.
-
(1999)
NDSS
-
-
Monrose, F.1
Wycko, P.2
Rubin, A.D.3
-
47
-
-
0018456413
-
Relations among complexity measures
-
Apr.
-
N. Pippenger and M. J. Fischer. Relations among complexity measures. J. of the ACM, 26(2):361-381, Apr. 1979.
-
(1979)
J. of the ACM
, vol.26
, Issue.2
, pp. 361-381
-
-
Pippenger, N.1
Fischer, M.J.2
-
48
-
-
79951998286
-
Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency
-
A.-R. Sadeghi, T. Schneider, and M. Winandy. Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In TRUST, 2010.
-
(2010)
TRUST
-
-
Sadeghi, A.-R.1
Schneider, T.2
Winandy, M.3
-
49
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In SOSP, 2005.
-
(2005)
SOSP
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
50
-
-
85092637329
-
Toward practical and unconditional verification of remote computations
-
S. Setty, A. J. Blumberg, and M. Walfish. Toward practical and unconditional verification of remote computations. In HotOS, 2011.
-
(2011)
HotOS
-
-
Setty, S.1
Blumberg, A.J.2
Walfish, M.3
-
51
-
-
84873963481
-
Resolving the conflict between generality and plausibility in verified computation
-
Report 2012/622
-
S. Setty, B. Braun, V. Vu, A. J. Blumberg, B. Parno, and M. Walfish. Resolving the conflict between generality and plausibility in verified computation. Cryptology ePrint Archive, Report 2012/622, 2012.
-
(2012)
Cryptology ePrint Archive
-
-
Setty, S.1
Braun, B.2
Vu, V.3
Blumberg, A.J.4
Parno, B.5
Walfish, M.6
-
52
-
-
85180792160
-
Making argument systems for outsourced computation practical (sometimes)
-
S. Setty, R. McPherson, A. J. Blumberg, and M. Walfish. Making argument systems for outsourced computation practical (sometimes). In NDSS, 2012.
-
(2012)
NDSS
-
-
Setty, S.1
McPherson, R.2
Blumberg, A.J.3
Walfish, M.4
-
53
-
-
84877709491
-
Taking proof-based verified computation a few steps closer to practicality
-
(extended version). Report 2012/598
-
S. Setty, V. Vu, N. Panpalia, B. Braun, M. Ali, A. J. Blumberg, and M. Walfish. Taking proof-based verified computation a few steps closer to practicality (extended version). Cryptology ePrint Archive, Report 2012/598, 2012.
-
(2012)
Cryptology ePrint Archive
-
-
Setty, S.1
Vu, V.2
Panpalia, N.3
Braun, B.4
Ali, M.5
Blumberg, A.J.6
Walfish, M.7
-
54
-
-
85076228457
-
Taking proof-based verified computation a few steps closer to practicality
-
S. Setty, V. Vu, N. Panpalia, B. Braun, A. J. Blumberg, and M. Walfish. Taking proof-based verified computation a few steps closer to practicality. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Setty, S.1
Vu, V.2
Panpalia, N.3
Braun, B.4
Blumberg, A.J.5
Walfish, M.6
|