Author of the publication

ΣC: A Programming Model and Language for Embedded Manycores.

, , , and . ICA3PP (1), volume 7016 of Lecture Notes in Computer Science, page 385-394. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE., , , and . WAHC@CCS, page 79-90. ACM, (2023)A SaaS Implementation of a New Generic Crypto-Classifier Service for Secure Energy Efficiency in Smart Cities., , , , , and . SMARTGREENS/VEHITS (Selected Papers), volume 992 of Communications in Computer and Information Science, page 90-115. Springer, (2018)TAQOS: A Benchmark Protocol for Quantum Optimization Systems., , and . ICCS (5), volume 14077 of Lecture Notes in Computer Science, page 168-176. Springer, (2023)Solving Higher Order Binary Optimization Problems on NISQ Devices: Experiments and Limitations., , , and . ICCS (5), volume 14077 of Lecture Notes in Computer Science, page 224-232. Springer, (2023)Designing a General-Purpose 8-bit (T)FHE Processor Abstraction., , , and . IACR Cryptol. ePrint Arch., (2024)On the Practical CPAD Security of "exact" and Threshold FHE Schemes and Libraries., , , and . CRYPTO (3), volume 14922 of Lecture Notes in Computer Science, page 3-33. Springer, (2024)Privacy-Preserving Tax Calculations in Smart Cities by Means of Inner-Product Functional Encryption., , , , , and . CSNet, page 1-8. IEEE, (2018)Towards a Quantum Algorithm for Evaluating WCETs., , and . Q-SET@QCE, volume 3008 of CEUR Workshop Proceedings, page 66-80. CEUR-WS.org, (2021)ΣC: A Programming Model and Language for Embedded Manycores., , , and . ICA3PP (1), volume 7016 of Lecture Notes in Computer Science, page 385-394. Springer, (2011)Towards real-time hidden speaker recognition by means of fully homomorphic encryption., , and . IACR Cryptology ePrint Archive, (2019)