Iniciativa IMDEA
Resumen: Microarchitectural attacks, such as Spectre and Meltdown, illustrate that artifacts of hardware implementations (like sp...
Resumen: Vector Commitments allow one to (concisely) commit to a vector of messages so that one can later (concisely) open the co...
Resumen: Cryptographic accumulators are a common solution to proving information about a large set . They allow to compute a shor...
Resumen: Programs that deal with heap-allocated inputs are difficult to analyze with symbolic execution (SE). Lazy Initialization...
Resumen: Cloud computing has revolutionized the access to and the use of emerging computing hardware technologies. To achieve eff...
Resumen: Proofs of Retrievability (PoRs) are protocols which allow a client to store data remotely and to efficiently ensure, via...
Resumen: Cybercriminals often leverage Bitcoin for their illicit activities. In this work, we propose back-and-forth exploration,...