Hermanns, J., Skitsas, K., Tsitsulin, A., Munkhoeva, M., Kyster, A., Nielsen, S., Bronstein, A. M.
, Mottin, D. & Karras, P. (2023).
GRASP: Scalable Graph Alignment by Spectral Corresponding Functions.
ACM Transactions on Knowledge Discovery from Data,
17(4), 1-26. Article 50.
https://doi.org/10.1145/3561058
Heljanko, K., Junttila, T. A., Keinänen, M.
, Lange, M. & Latvala, T. (2006).
Bounded Model Checking for Weak Alternating Büchi Automata. In T. Ball & R. B. Jones (Eds.),
CAV ´06: Computer Aided Verification, 18th International Conference (pp. 95-108)
https://doi.org/10.1007/11817963_12
Hein, J.
, Wiuf, C., Møller, M., Knudsen, B. & Wibling, G. (2000).
Statistical alignment: computational properties, homology testing and goodness-of-fit.
J. Mol. Biol.,
302(1), 265-279.
https://doi.org/10.1006/jmbi.2000.4061
Hedin, G., Magnusson, B., Fors, D. S., Robertz, S.
, Gjerlufsen, T. & Andersen, P. (2007).
PalCom Deliverable 49 (2.6.3). Support for End-User Composition in PalCom.
http://www.ist-palcom.org/publications/deliverables/Deliverable-49-[2.6.3]-end-user-composition.pdf
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
TinyKeys: A New Approach to Efficient Multi-Party Computation. In H. Shacham & A. Boldyreva (Eds.),
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings (Vol. 10993, pp. 3-33). Springer VS.
https://doi.org/10.1007/978-3-319-96878-0_1
Hazay, C., Orsini, E.
, Scholl, P. & Soria-Vazquez, E. (2018).
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). In T. Peyrin & S. Galbraith (Eds.),
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (Vol. 11274, pp. 86-117). Springer VS.
https://doi.org/10.1007/978-3-030-03332-3_4
Hazay, C., López-Alt, A., Wee, H.
& Wichs, D. (2013).
Leakage-resilient cryptography from minimal assumptions. In T. Johansson & P. Nguyen (Eds.),
Leakage-Resilient Cryptography from Minimal Assumptions: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 160-176). Springer VS.
https://doi.org/10.1007/978-3-642-38348-9_10
Haselwarter, P. G., Rivas, E., Van Muylder, A., Winterhalter, T., Abate, C.
, Sidorenco, N., Hriţcu, C., Maillard, K.
& Spitters, B. (2023).
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq.
ACM Transactions on Programming Languages and Systems,
45(3), 61. Article 15.
https://doi.org/10.1145/3594735
Haselwarter, P. G., Hvass, B. S., Hansen, L. L., Winterhalter, T., Hriţcu, C.
& Spitters, B. (2024).
The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography. In A. Timany, D. Traytel, B. Pientka & S. Blazy (Eds.),
CPP 2024: Proceedings of the 13th ACM SIGPLAN International Conference on Certified Programs and Proofs (pp. 30-44). Association for Computing Machinery.
https://doi.org/10.1145/3636501.3636961
Hansen, K. M., MacIntyre, B., Mynatt, E. D., Tullio, J. & Voida, S. (2001).
Hypermedia in the Kimura System: Using Spacial, Temporal and Navigational Relationships to Support Multitasking and Background Awareness. In
Proceedings of the twelfth ACM Conference on Hypertext and Hypermedia (Vol. Posters). ACM Press New York, NY, USA.