Certificates to a linear algebra computation are additional data struc-tures for each output, which can be used by a—possibly randomized— verification algorithm that proves the correctness of each output. The certificates are essentially optimal if the time (and space) complexity of verification is essentially linear in the input size N, meaning N times a factor No(1), i.e., a factor Nη(N) with limN→ ∞ η(N) = 0. We give algorithms that compute essentially optimal certificates for the positive semidefiniteness, Frobenius form, characteristic and minimal polynomial of an n × n dense integer matrix A. Our certificates can be verified in Monte-Carlo bit complexity (n2 log ‖A‖)1+o(1), where log ‖A‖ is the bit size of the integer entries, solvin...
This "habilitation à diriger des recherches" manuscript concerns the efficiency in exact linear alge...
A Las Vegas type probabilistic algorithm is presented for finding the Frobenius canonical form of an...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...
Certificates to a linear algebra computation are additional data struc-tures for each output, which ...
International audienceCertificates to a linear algebra computation are additional data structures fo...
International audienceComputational problem certificates are additional data structures for each out...
International audienceFor a given computational problem, a certificate is a piece of data that one(t...
International audienceWe present an interactive probabilistic proof protocol that certifies in (log ...
International audienceIn this paper, we give novel certificates for triangular equivalence and rank ...
International audienceWe design and analyze new protocols to verify the correctness of various compu...
AbstractThe topic of this paper is the complexity of algebraic decision trees deciding membership in...
Motivated by the growth in outsourced data analysis, we describe methods for verifying basic linear ...
Motivated by the growth in outsourced data analysis, we describe methods for verifying basic linear ...
International audienceWith the emergence of cloud computing services, computationally weak devices (...
Abstract. A Zero-knowledge protocol provides provably secure entity authentication based on a hard c...
This "habilitation à diriger des recherches" manuscript concerns the efficiency in exact linear alge...
A Las Vegas type probabilistic algorithm is presented for finding the Frobenius canonical form of an...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...
Certificates to a linear algebra computation are additional data struc-tures for each output, which ...
International audienceCertificates to a linear algebra computation are additional data structures fo...
International audienceComputational problem certificates are additional data structures for each out...
International audienceFor a given computational problem, a certificate is a piece of data that one(t...
International audienceWe present an interactive probabilistic proof protocol that certifies in (log ...
International audienceIn this paper, we give novel certificates for triangular equivalence and rank ...
International audienceWe design and analyze new protocols to verify the correctness of various compu...
AbstractThe topic of this paper is the complexity of algebraic decision trees deciding membership in...
Motivated by the growth in outsourced data analysis, we describe methods for verifying basic linear ...
Motivated by the growth in outsourced data analysis, we describe methods for verifying basic linear ...
International audienceWith the emergence of cloud computing services, computationally weak devices (...
Abstract. A Zero-knowledge protocol provides provably secure entity authentication based on a hard c...
This "habilitation à diriger des recherches" manuscript concerns the efficiency in exact linear alge...
A Las Vegas type probabilistic algorithm is presented for finding the Frobenius canonical form of an...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...