-
1
-
-
85080588018
-
-
CUDA (http://developer.nvidia.com/what-cuda).
-
-
-
-
2
-
-
85080597962
-
-
Open MPI
-
Open MPI (http://www.open-mpi.org).
-
-
-
-
4
-
-
78650270049
-
From secrecy to soundness: Efficient verification via secure computation
-
B. Applebaum, Y. Ishai, and E. Kushilevitz. From secrecy to soundness: efficient verification via secure computation. In ICALP, 2010.
-
(2010)
ICALP
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
5
-
-
0032058198
-
Proof verification and the hardness of approximation problems
-
May
-
S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hardness of approximation problems. J. of the ACM, 45(3):501–555, May 1998.
-
(1998)
J. Of the ACM
, vol.45
, Issue.3
, pp. 501-555
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
6
-
-
0031651077
-
Probabilistic checking of proofs: A new characterization of NP
-
Jan
-
S. Arora and S. Safra. Probabilistic checking of proofs: a new characterization of NP. J. of the ACM, 45(1):70–122, Jan. 1998.
-
(1998)
J. Of the ACM
, vol.45
, Issue.1
, pp. 70-122
-
-
Arora, S.1
Safra, S.2
-
8
-
-
0030289082
-
Linearity testing in characteristic two
-
Nov
-
M. Bellare, D. Coppersmith, J. Håstad, M. Kiwi, and M. Sudan. Linearity testing in characteristic two. IEEE Transactions on Information Theory, 42(6):1781–1795, Nov. 1996.
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.6
, pp. 1781-1795
-
-
Bellare, M.1
Coppersmith, D.2
Håstad, J.3
Kiwi, M.4
Sudan, M.5
-
9
-
-
0027308413
-
Efficient probabilistically checkable proofs and applications to approximations
-
M. Bellare, S. Goldwasser, C. Lund, and A. Russell. Efficient probabilistically checkable proofs and applications to approximations. In STOC, 1993.
-
(1993)
STOC
-
-
Bellare, M.1
Goldwasser, S.2
Lund, C.3
Russell, A.4
-
10
-
-
84898945449
-
Multi-prover interactive proofs: How to remove intractability assumptions
-
M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson. Multi-prover interactive proofs: how to remove intractability assumptions. In STOC, 1988.
-
(1988)
STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
11
-
-
84862621790
-
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems
-
Feb
-
E. Ben-Sasson, A. Chiesa, D. Genkin, and E. Tromer. Fast reductions from RAMs to delegatable succinct constraint satisfaction problems. Feb. 2012. Cryptology eprint 071.
-
(2012)
Cryptology Eprint 071
-
-
Ben-Sasson, E.1
Chiesa, A.2
Genkin, D.3
Tromer, E.4
-
12
-
-
84942522505
-
On the concrete-efficiency threshold of probabilistically-checkable proofs
-
Apr
-
E. Ben-Sasson, A. Chiesa, D. Genkin, and E. Tromer. On the concrete-efficiency threshold of probabilistically-checkable proofs. ECCC, (045), Apr. 2012.
-
(2012)
ECCC
, Issue.45
-
-
Ben-Sasson, E.1
Chiesa, A.2
Genkin, D.3
Tromer, E.4
-
13
-
-
34547829716
-
Robust PCPs of proximity, shorter PCPs and applications to coding
-
Dec
-
E. Ben-Sasson, O. Goldreich, P. Harsha, M. Sudan, and S. Vadhan. Robust PCPs of proximity, shorter PCPs and applications to coding. SIAM J. on Comp., 36(4):889–974, Dec. 2006.
-
(2006)
SIAM J. On Comp.
, vol.36
, Issue.4
, pp. 889-974
-
-
Ben-Sasson, E.1
Goldreich, O.2
Harsha, P.3
Sudan, M.4
Vadhan, S.5
-
14
-
-
55249095082
-
Short PCPs with polylog query complexity
-
May
-
E. Ben-Sasson and M. Sudan. Short PCPs with polylog query complexity. SIAM J. on Comp., 38(2):551–607, May 2008.
-
(2008)
SIAM J. On Comp.
, vol.38
, Issue.2
, pp. 551-607
-
-
Ben-Sasson, E.1
Sudan, M.2
-
15
-
-
0029214558
-
Designing programs that check their work
-
M. Blum and S. Kannan. Designing programs that check their work. J. of the ACM, 42(1):269–291, 1995.
-
(1995)
J. Of the ACM
, vol.42
, Issue.1
, pp. 269-291
-
-
Blum, M.1
Kannan, S.2
-
16
-
-
0000619172
-
Self-testing/correcting with applications to numerical problems
-
Dec
-
M. Blum, M. Luby, and R. Rubinfeld. Self-testing/correcting with applications to numerical problems. J. of Comp. and Sys. Sciences, 47(3):549–595, Dec. 1993.
-
(1993)
J. Of Comp. Of Sys. Sciences
, vol.47
, Issue.3
, pp. 549-595
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
17
-
-
82955182557
-
Homomorphic signatures for polynomial functions
-
D. Boneh and D. M. Freeman. Homomorphic signatures for polynomial functions. In EUROCRYPT, 2011.
-
(2011)
EUROCRYPT
-
-
Boneh, D.1
Freeman, D.M.2
-
18
-
-
33745165088
-
Evaluating 2-DNF formulas on ciphertexts
-
D. Boneh, E. J. Goh, and K. Nissim. Evaluating 2-DNF formulas on ciphertexts. In TCC, 2005.
-
(2005)
TCC
-
-
Boneh, D.1
Goh, E.J.2
Nissim, K.3
-
19
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
G. Brassard, D. Chaum, and C. Crépeau. Minimum disclosure proofs of knowledge. J. of Comp. and Sys. Sciences, 37(2):156–189, 1988.
-
(1988)
J. Of Comp. Of Sys. Sciences
, vol.37
, Issue.2
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crépeau, C.3
-
20
-
-
80755127640
-
Improved delegation of computation using fully homomorphic encryption
-
K.-M. Chung, Y. Kalai, and S. Vadhan. Improved delegation of computation using fully homomorphic encryption. In CRYPTO, 2010.
-
(2010)
CRYPTO
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
21
-
-
84856468957
-
Practical verified computation with streaming interactive proofs
-
G. Cormode, M. Mitzenmacher, and J. Thaler. Practical verified computation with streaming interactive proofs. In ITCS, 2012.
-
(2012)
ITCS
-
-
Cormode, G.1
Mitzenmacher, M.2
Thaler, J.3
-
22
-
-
34250354807
-
The PCP theorem by gap amplification
-
June
-
I. Dinur. The PCP theorem by gap amplification. J. of the ACM, 54(3), June 2007.
-
(2007)
J. Of the ACM
, vol.54
, Issue.3
-
-
Dinur, I.1
-
23
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469–472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
24
-
-
79960854270
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO, 2010.
-
(2010)
CRYPTO
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
26
-
-
84873362452
-
Fully homomorphic message authenticators
-
May
-
R. Gennaro and D. Wichs. Fully homomorphic message authenticators. May 2012. Cryptology eprint 290.
-
(2012)
Cryptology Eprint
, vol.290
-
-
Gennaro, R.1
Wichs, D.2
-
28
-
-
84865663852
-
Homomorphic evaluation of the AES circuit
-
C. Gentry, S. Halevi, and N. Smart. Homomorphic evaluation of the AES circuit. In CRYPTO, 2012.
-
(2012)
CRYPTO
-
-
Gentry, C.1
Halevi, S.2
Smart, N.3
-
29
-
-
0026122066
-
What every computer scientist should know about floating-point arithmetic
-
Mar
-
D. Goldberg. What every computer scientist should know about floating-point arithmetic. ACM Computing Surveys, 23(1):5–48, Mar. 1991.
-
(1991)
ACM Computing Surveys
, vol.23
, Issue.1
, pp. 5-48
-
-
Goldberg, D.1
-
31
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
S. Goldwasser, Y. T. Kalai, and G. N. Rothblum. Delegating computation: Interactive proofs for muggles. In STOC, 2008.
-
(2008)
STOC
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
32
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. on Comp., 18(1):186–208, 1989.
-
(1989)
SIAM J. On Comp.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
33
-
-
85051027713
-
Linear algebra with sub-linear zero-knowledge arguments
-
J. Groth. Linear algebra with sub-linear zero-knowledge arguments. In CRYPTO, 2009.
-
(2009)
CRYPTO
-
-
Groth, J.1
-
36
-
-
85076614343
-
SSLShader: Cheap SSL acceleration with commodity processors
-
K. Jang, S. Han, S. Han, S. Moon, and K. Park. SSLShader: Cheap SSL acceleration with commodity processors. In NSDI, 2011.
-
(2011)
NSDI
-
-
Jang, K.1
Han, S.2
Han, S.3
Moon, S.4
Park, K.5
-
37
-
-
84881243280
-
A note on efficient zero-knowledge proofs and arguments (extended abstract)
-
J. Kilian. A note on efficient zero-knowledge proofs and arguments (extended abstract). In STOC, 1992.
-
(1992)
STOC
-
-
Kilian, J.1
-
38
-
-
0344407518
-
Improved efficient arguments (preliminary version)
-
J. Kilian. Improved efficient arguments (preliminary version). In CRYPTO, 1995.
-
(1995)
CRYPTO
-
-
Kilian, J.1
-
40
-
-
0002586876
-
Digital signature based on a conventional encryption function
-
R. C. Merkle. Digital signature based on a conventional encryption function. In CRYPTO, 1987.
-
(1987)
CRYPTO
-
-
Merkle, R.C.1
-
41
-
-
0034854953
-
Computationally sound proofs
-
S. Micali. Computationally sound proofs. SIAM J. on Comp., 30(4):1253–1298, 2000.
-
(2000)
SIAM J. On Comp.
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
43
-
-
0027929411
-
Nearly-linear size holographic proofs
-
A. Polishchuk and D. A. Spielman. Nearly-linear size holographic proofs. In STOC, 1994.
-
(1994)
STOC
-
-
Polishchuk, A.1
Spielman, D.A.2
-
44
-
-
85092637329
-
Toward practical and unconditional verification of remote computations
-
S. Setty, A. J. Blumberg, and M. Walfish. Toward practical and unconditional verification of remote computations. In HotOS, 2011.
-
(2011)
HotOS
-
-
Setty, S.1
Blumberg, A.J.2
Walfish, M.3
-
45
-
-
85180792160
-
Making argument systems for outsourced computation practical (sometimes)
-
S. Setty, R. McPherson, A. J. Blumberg, and M. Walfish. Making argument systems for outsourced computation practical (sometimes). In NDSS, 2012.
-
(2012)
NDSS
-
-
Setty, S.1
McPherson, R.2
Blumberg, A.J.3
Walfish, M.4
-
46
-
-
84877709491
-
-
Technical Report TR-12-14, Dept. of CS, UT Austin, June
-
S. Setty, V. Vu, N. Panpalia, B. Braun, A. J. Blumberg, and M. Walfish. Taking proof-based verified computation a few steps closer to practicality (extended version). Technical Report TR-12-14, Dept. of CS, UT Austin, June 2012.
-
(2012)
Taking Proof-Based Verified Computation A Few Steps Closer to Practicality (Extended Version)
-
-
Setty, S.1
Vu, V.2
Panpalia, N.3
Braun, B.4
Blumberg, A.J.5
Walfish, M.6
-
49
-
-
85088779599
-
Verifiable computation with massively parallel interactive proofs
-
June Full paper at Feb. 2012
-
J. Thaler, M. Roberts, M. Mitzenmacher, and H. Pfister. Verifiable computation with massively parallel interactive proofs. In USENIX HotCloud Workshop, June 2012. Full paper at http://arxiv.org/abs/1202.1350, Feb. 2012.
-
(2012)
USENIX HotCloud Workshop
-
-
Thaler, J.1
Roberts, M.2
Mitzenmacher, M.3
Pfister, H.4
-
52
-
-
0022882770
-
How to generate and exchange secrets
-
A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
-
(1986)
FOCS
-
-
Yao, A.C.-C.1
|