Searched for keywords.author.keyword:"computational complexity and cryptography" OR acmdlCCS:"computational complexity and cryptography"  [new search]  [edit/save query]  [advanced search]
Searched The ACM Full-Text Collection: 472,798 records   [Expand your search to The ACM Guide to Computing Literature: 2,693,848 records] Help: ACM vs. Guide
3,586 results found
Export Results: bibtexendnoteacmrefcsv

Refine by People
Names show/hide
Institutions show/hide
Authors show/hide
Editors show/hide
Reviewers show/hide
Refine by Publications
Publication Names show/hide
ACM Publications show/hide
All Publications show/hide
Content Formats show/hide
Publishers show/hide
Refine by Conferences
Sponsors show/hide
Events show/hide
Proceeding Series show/hide
Refine by Publication Year
1962
Result 1 – 20 of 3,586
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1 published by ACM
July 2016 EuroPlop '16: Proceedings of the 21st European Conference on Pattern Languages of Programs
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 20,   Downloads (Overall): 20

Full text available: PDFPDF
The search for prime numbers is, unarguably, one of the most important problems in computational number theory. In addition to its intrinsic theoretical interest, research on the subject has been spurred by the compelling need for security in the digital world. A collection of patterns which aims at solving the ...
Keywords: prime generation algorithms
[result highlights]

2 published by ACM
February 2016 ACM Transactions on Computation Theory (TOCT): Volume 8 Issue 1, February 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 64,   Downloads (Overall): 78

Full text available: PDFPDF
Obtaining a nontrivial (superlinear) lower bound for computation of the Fourier transform in the linear circuit model has been a long-standing open problem for more than 40 years. An early result by Morgenstern from 1973, provides an Ω( n log n ) lower bound for the unnormalized Fourier transform when ...
Keywords: lower bounds, Fourier transform
[result highlights]

3 published by ACM
April 2017 ACM Transactions on Computation Theory (TOCT): Volume 9 Issue 2, May 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 24,   Downloads (12 Months): 24,   Downloads (Overall): 24

Full text available: PDFPDF
A red-blue graph is a graph where every edge is colored either red or blue. The exact perfect matching problem asks for a perfect matching in a red-blue graph that has exactly a given number of red edges. We show that for complete and bipartite complete graphs, the exact perfect ...
Keywords: Perfect matching, computational complexity, exact perfect matching, complete graphs
[result highlights]

4 published by ACM
July 2016 ACM Transactions on Computation Theory (TOCT): Volume 8 Issue 4, July 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 50,   Downloads (Overall): 50

Full text available: PDFPDF
To reduce a graph problem to its planar version, a standard technique is to replace crossings in a drawing of the input graph by planarizing gadgets. We show unconditionally that such a reduction is not possible for the perfect matching problem and also extend this to some other problems related ...
Keywords: planar graphs, Parallel complexity, perfect matching
[result highlights]

5
June 2015 CCC '15: Proceedings of the 30th Conference on Computational Complexity
Publisher: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
Bibliometrics:
Citation Count: 1

This paper gives the first correlation bounds under product distributions, including the uniform distribution, against the class mNC 1 of polynomial-size O (log n )-depth monotone circuits. Our main theorem, proved using the pathset complexity framework introduced in [56], shows that the average-case k -CYCLE problem (on Erdős-Rényi random graphs ...
Keywords: circuit complexity, average-case complexity
[result highlights]

6 published by ACM
August 2007 IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 167

Full text available: PDFPDF
The code division multiple access (CDMA) system capacity is limited by the amount of interference of the system. To reduce the unnecessary interference, this paper proposes optimized cell identification (ID) codes for site selection diversity transmission (SSDT) power control in wideband code division multiple access system of third generation partnership ...
Keywords: FHT, cell ID, CDMA, SSDT
[result highlights]

7 published by ACM
January 1985 Journal of the ACM (JACM): Volume 32 Issue 1, Jan. 1985
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 390

Full text available: PDFPDF
Nancy Lynch proved that if a decision problem A is not solvable in polynomial time, then there exists an infinite recursive subset X of its domain on which the decision is almost everywhere complex. In this paper, general theorems of this kind that can be applied to several well-known automata-based ...
[result highlights]

8 published by ACM
December 2014 Journal of the ACM (JACM): Volume 61 Issue 6, November 2014
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 22,   Downloads (Overall): 204

Full text available: PDFPDF
We study the set disjointness problem in the most powerful model of bounded-error communication, the k -party randomized number-on-the-forehead model. We show that set disjointness requires Ω(√n/2 k k ) bits of communication, where n is the size of the universe. Our lower bound generalizes to quantum communication, where it ...
Keywords: multiparty communication complexity, quantum communication complexity, polynomial approximation, Set disjointness problem, directional derivatives
[result highlights]

9 published by ACM
August 2007 ICEC '07: Proceedings of the ninth international conference on Electronic commerce
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 190

Full text available: PDFPDF
The use of trading agents to manage the allocation and bundling of resources across computer networks is well established and literature to date has focused on a variety of auction and distributed market type mechanisms that use economic principles to determine the "best" allocation. An empirical analysis of a number ...
Keywords: grid, allocation, combinatorial auctions, distributed market performance, trading agents, quote driven market, resource
[result highlights]

10 published by ACM
July 2010 PODC '10: Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 2,   Downloads (12 Months): 7,   Downloads (Overall): 83

Full text available: PDFPDF
We demonstrate how to leverage a system's capability for all-to-all communication to achieve an exponential speed-up of local algorithms despite bandwidth and memory restrictions. More precisely, if a network comprises n nodes with all-to-all bandwidth n ε (ε > 0 constant) and nodes know their input and neighborhood with respect ...
Keywords: simulation, local algorithms, all-to-all communication
[result highlights]

11 published by ACM
May 1971 STOC '71: Proceedings of the third annual ACM symposium on Theory of computing
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 8,   Downloads (Overall): 288

Full text available: PDFPDF
A classification of all the computable functions is given in terms of subrecursive programming languages. These classes are those which also arise from the relation “primitive recursive in.” By distinguishing between honest and dishonest classes the classification is related to the computational complexity of the functions classified, and the classification ...
[result highlights]

12 published by ACM
May 2016 AsiaPKC '16: Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 27,   Downloads (12 Months): 88,   Downloads (Overall): 103

Full text available: PDFPDF
We present a method for key compression in quantumresistant isogeny-based cryptosystems, which allows a reduction in and transmission costs of per-party public information by a factor of two, with no e ect on security. We achieve this reduction by associating a canonical choice of elliptic curve to each j-invariant, and ...
Keywords: key compression, isogenies, elliptic curves, post-quantum cryptography
[result highlights]

13 published by ACM
February 2016 FPGA '16: Proceedings of the 2016 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8,   Downloads (12 Months): 75,   Downloads (Overall): 128

Full text available: PDFPDF
We propose a method to automatically derive hardware structures that perform a fixed linear permutation on streaming data. Linear permutations are permutations that map linearly the bit representation of the elements addresses. This set contains many of the most important permutations in media processing, communication, and other applications and includes ...
Keywords: data reordering, matrix transposition, streaming datapath, matrix factorization, connection network, stride permutation, bit-reversal
[result highlights]

14 published by ACM
July 1992 COLT '92: Proceedings of the fifth annual workshop on Computational learning theory
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 1,   Downloads (12 Months): 3,   Downloads (Overall): 135

Full text available: PDFPDF
We study the on-line learning of classes of functions of a single real variable formed through bounds on various norms of functions' derivatives. We determine the best bounds obtainable on the worst-case sum of squared errors (also “absolute” errors) for several such classes.
[result highlights]

15 published by ACM
July 1996 STOC '96: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 1,   Downloads (12 Months): 3,   Downloads (Overall): 203

Full text available: PDFPDF
[result highlights]

16 published by ACM
July 2010 PODC '10: Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 112

Full text available: PDFPDF
We quantify the effect of Bayesian ignorance by comparing the social cost obtained in a Bayesian game by agents with local views to the expected social cost of agents having global views. Both benevolent agents, whose goal is to minimize the social cost, and selfish agents, aiming at minimizing their ...
Keywords: bayesian games, network cost sharing, local vs. global view
[result highlights]

17 published by ACM
June 2010 STOC '10: Proceedings of the forty-second ACM symposium on Theory of computing
Publisher: ACM
Bibliometrics:
Citation Count: 56
Downloads (6 Weeks): 2,   Downloads (12 Months): 13,   Downloads (Overall): 344

Full text available: PDFPDF
Consider the following two-player communication process to decide a language L: The first player holds the entire input x but is polynomially bounded; the second player is computationally unbounded but does not know any part of x; their goal is to cooperatively decide whether x belongs to L at small ...
Keywords: feedback vertex set, parameterized complexity, probabilistically checkable proofs, vertex cover, vertex deletion problems, arithmetic progression free sets, hereditary graph properties, sparsification, kernelization, satisfiability
[result highlights]

18 published by ACM
June 2010 STOC '10: Proceedings of the forty-second ACM symposium on Theory of computing
Publisher: ACM
Bibliometrics:
Citation Count: 11
Downloads (6 Weeks): 1,   Downloads (12 Months): 15,   Downloads (Overall): 307

Full text available: PDFPDF
We prove that the complexity class QIP, which consists of all problems having quantum interactive proof systems, is contained in PSPACE. This containment is proved by applying a parallelized form of the matrix multiplicative weights update method to a class of semidefinite programs that captures the computational power of quantum ...
Keywords: quantum computation, semidefinite programming, matrix multiplicative weights update method, quantum interactive proof systems
[result highlights]

19 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 28,   Downloads (12 Months): 277,   Downloads (Overall): 277

Full text available: PDFPDF
In the setting of secure multiparty computation, a set of parties with private inputs wish to compute some function of their inputs without revealing anything but their output. Over the last decade, the efficiency of secure two-party computation has advanced in leaps and bounds, with speedups of some orders of ...
Keywords: secure multiparty computation, concrete efficiency, cryptography, garbled circuits
[result highlights]

20 published by ACM
May 2012 STOC '12: Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 2,   Downloads (12 Months): 6,   Downloads (Overall): 165

Full text available: PDFPDF
This work deals with the power of linear algebra in the context of multilinear computation. By linear algebra we mean algebraic branching programs (ABPs) which are known to be computationally equivalent to two basic tools in linear algebra: iterated matrix multiplication and the determinant. We compare the computational power of ...
Keywords: arithmetic circuits, multilinear computations, algebraic branching programs, arithmetic formulas, polynomials
[result highlights]

Result 1 – 20 of 3,586
Result page: 1 2 3 4 5 6 7 8 9 10 >>



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us
 
Export Formats