Showing 41–60 of 74 results
/ Date/ Name
Dec 11, 2011Decorated proofs for computational effects: StatesApr 17, 2012Computational linear algebra over finite fieldsOct 2, 2013Patterns for computational effects arising from a monad or a comonadJan 8, 2016Fast Computation of the Rank Profile Matrix and the Generalized Bruhat DecompositionMar 3, 2015Hilbert-Post completeness for the state and the exception effectsJul 13, 2016Private Multi-party Matrix Multiplication and Trust ComputationsMar 19, 2009Cartesian effect categories are Freyd-categoriesMar 13, 2008Compressed Modular Matrix MultiplicationOct 2, 2007Q-adic Transform revisitedJan 23, 2010Generic design of Chinese remaindering schemesJul 10, 2011Matrix powers algorithms for trust evaluation in PKI architecturesJan 7, 2009Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also VulnerableAug 30, 2008Simultaneous Modular Reduction and Kronecker Substitution for Small Finite FieldsMay 5, 2010Generic design of Chinese remaindering schemesApr 4, 2011Recursive double-size fixed precision arithmeticJul 5, 2012Adjunctions for exceptionsJan 13, 2020On fast multiplication of a matrix by its transposeOct 9, 2013Certified proofs in programs involving exceptionsNov 26, 2014Program certification with computational effectsFeb 26, 2018Symmetric indefinite triangular factorization revealing the rank profile matrix