Bilinear operations are ubiquitous in computer science and in particular...
This study introduces the concept of the forking effect in the cryptocur...
We consider the fast in-place computation of the Euclidean polynomial mo...
We consider the problem of efficiently evaluating a secret polynomial at...
We present a non-commutative algorithm for the multiplication of a 2 x 2...
Proofs of Retrievability (PoRs) are protocols which allow a client to st...
In Conspiracy Santa, a variant of Secret Santa, a group of people offer ...
In 1968, Liu described the problem of securing the documents in a shared...
We present a non-commutative algorithm for the multiplication of a
2x2-b...
In this paper, we give novel certificates for triangular equivalence and...
We present new algorithms to detect and correct errors in the lower-uppe...
In an emerging computing paradigm, computational capabilities, from
proc...
We present a novel recursive algorithm for reducing a symmetric matrix t...
With the emergence of cloud computing services, computationally weak dev...
In this paper, we give novel certificates for triangular equivalence and...
The complexity of matrix multiplication (hereafter MM) has been intensiv...
This paper deals with distributed matrix multiplication. Each player own...
Certificates to a linear algebra computation are additional data structu...
The row (resp. column) rank profile of a matrix describes the stair-case...