7 results on '"J. Bouman"'
Search Results
2. A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals.
3. Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks.
4. Real-time control of an ensemble of heterogeneous resources.
5. An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification.
6. Secure Authentication from a Weak Key, without Leaking Information.
7. Sampling in a Quantum Population, and Applications.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.