Skip to main content

Showing 1–11 of 11 results for author: Nielsen, J B

.
  1. arXiv:2312.09422  [pdf, other

    eess.SP cs.LG math.FA stat.ME

    Joint Alignment of Multivariate Quasi-Periodic Functional Data Using Deep Learning

    Authors: Vi Thanh Pham, Jonas Bille Nielsen, Klaus Fuglsang Kofoed, Jørgen Tobias Kühl, Andreas Kryger Jensen

    Abstract: The joint alignment of multivariate functional data plays an important role in various fields such as signal processing, neuroscience and medicine, including the statistical analysis of data from wearable devices. Traditional methods often ignore the phase variability and instead focus on the variability in the observed amplitude. We present a novel method for joint alignment of multivariate quasi… ▽ More

    Submitted 14 November, 2023; originally announced December 2023.

    Comments: 28 pages, 6 figures

  2. arXiv:2108.02995  [pdf, other

    cs.PL cs.LO

    Extracting functional programs from Coq, in Coq

    Authors: Danil Annenkov, Mikkel Milo, Jakob Botsch Nielsen, Bas Spitters

    Abstract: We implement extraction of Coq programs to functional languages based on MetaCoq's certified erasure. We extend the MetaCoq erasure output language with ty** information and use it as an intermediate representation, which we call $λ^T_\square$. We complement the extraction functionality with a full pipeline that includes several standard transformations (eta-expansion, inlining, etc) implemented… ▽ More

    Submitted 6 August, 2021; originally announced August 2021.

    Comments: 57 pages; Coq development: https://github.com/AU-COBRA/ConCert/tree/journal-2021. arXiv admin note: substantial text overlap with arXiv:2012.09138

  3. Extracting Smart Contracts Tested and Verified in Coq

    Authors: Danil Annenkov, Mikkel Milo, Jakob Botsch Nielsen, Bas Spitters

    Abstract: We implement extraction of Coq programs to functional languages based on MetaCoq's certified erasure. As part of this, we implement an optimisation pass removing unused arguments. We prove the pass correct wrt. a conventional call-by-value operational semantics of functional languages. We apply this to two functional smart contract languages, Liquidity and Midlang, and to the functional language E… ▽ More

    Submitted 26 April, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: Coq implementation: https://github.com/AU-COBRA/ConCert/tree/artifact-2020 Update: fixed the "author running" list, fixed a mistake in an evaluation rule for lambda-box (Section 3.1, item 2)

    Journal ref: CPP'2021: Proceedings of the 10th ACM SIGPLAN International Conference on Certified Programs and Proofs, January 18--19, 2021, Virtual, Denmark

  4. arXiv:1911.04732  [pdf, ps, other

    cs.LO cs.PL

    Smart Contract Interactions in Coq

    Authors: Jakob Botsch Nielsen, Bas Spitters

    Abstract: We present a model/executable specification of smart contract execution in Coq. Our formalization allows for inter-contract communication and generalizes existing work by allowing modelling of both depth-first execution blockchains (like Ethereum) and breadth-first execution blockchains (like Tezos). We represent smart contracts programs in Coq's functional language Gallina, enabling easier reason… ▽ More

    Submitted 12 November, 2019; originally announced November 2019.

    Journal ref: 1st Workshop on Formal Methods for Blockchains, 3rd Formal Methods World Congress on October 11, 2019 in Porto, Portugal

  5. ConCert: A Smart Contract Certification Framework in Coq

    Authors: Danil Annenkov, Jakob Botsch Nielsen, Bas Spitters

    Abstract: We present a new way of embedding functional languages into the Coq proof assistant by using meta-programming. This allows us to develop the meta-theory of the language using the deep embedding and provides a convenient way for reasoning about concrete programs using the shallow embedding. We connect the deep and the shallow embeddings by a soundness theorem. As an instance of our approach, we dev… ▽ More

    Submitted 20 December, 2019; v1 submitted 24 July, 2019; originally announced July 2019.

    Comments: Extended the related work section. Significantly extended sections on translation and semantics. Added more examples and details about the formalisation. Commented of unquote and the trusted computing base. Commented on adequacy

    Journal ref: CPP 2020: Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, January 2020, Pages 215-228

  6. arXiv:1810.10635  [pdf, ps, other

    cs.DS cs.CR

    Lower Bounds for Oblivious Data Structures

    Authors: Riko Jacob, Kasper Green Larsen, Jesper Buus Nielsen

    Abstract: An oblivious data structure is a data structure where the memory access patterns reveals no information about the operations performed on it. Such data structures were introduced by Wang et al. [ACM SIGSAC'14] and are intended for situations where one wishes to store the data structure at an untrusted server. One way to obtain an oblivious data structure is simply to run a classic data structure o… ▽ More

    Submitted 24 October, 2018; originally announced October 2018.

    Comments: To appear at SODA'19

  7. arXiv:1701.00997  [pdf, other

    cs.CE cs.DC eess.SY

    Distributed Co-Simulation of Maritime Systems and Operations

    Authors: Severin Sad**a, Lars T. Kyllingstad, Martin Rindarøy, Stian Skjong, Vilmar Æsøy, Dariusz Eirik Fathi, Vahid Hassani, Trond Johnsen, Jørgen Bremnes Nielsen, Eilif Pedersen

    Abstract: Here, we present the concept of an open virtual prototy** framework for maritime systems and operations that enables its users to develop re-usable component or subsystem models, and combine them in full-system simulations for prototy**, verification, training, and performance studies. This framework consists of a set of guidelines for model coupling, high-level and low-level coupling interfac… ▽ More

    Submitted 4 January, 2017; originally announced January 2017.

    Comments: 17 pages, 9 figures

    ACM Class: I.6.0

  8. arXiv:1202.3052  [pdf, ps, other

    cs.CR

    A New Approach to Practical Active-Secure Two-Party Computation

    Authors: Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra

    Abstract: We propose a new approach to practical two-party computation secure against an active adversary. All prior practical protocols were based on Yao's garbled circuits. We use an OT-based approach and get efficiency via OT extension in the random oracle model. To get a practical protocol we introduce a number of novel techniques for relating the outputs and inputs of OTs in a larger construction. We… ▽ More

    Submitted 14 February, 2012; originally announced February 2012.

  9. arXiv:1108.6313  [pdf, ps, other

    quant-ph cs.CR

    Superposition Attacks on Cryptographic Protocols

    Authors: Ivan Damgaard, Jakob Funder, Jesper Buus Nielsen, Louis Salvail

    Abstract: Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryp… ▽ More

    Submitted 31 August, 2011; originally announced August 2011.

    Comments: 29 pages

  10. arXiv:1102.0887  [pdf, ps, other

    quant-ph cs.CR

    Fully Simulatable Quantum-Secure Coin-Flip** and Applications

    Authors: Carolin Lunemann, Jesper Buus Nielsen

    Abstract: We propose a coin-flip protocol which yields a string of strong, random coins and is fully simulatable against poly-sized quantum adversaries on both sides. It can be implemented with quantum-computational security without any set-up assumptions, since our construction only assumes mixed commitment schemes which we show how to construct in the given setting. We then show that the interactive gener… ▽ More

    Submitted 23 June, 2011; v1 submitted 4 February, 2011; originally announced February 2011.

    Comments: 27 pages; v3: updated according to final proceedings version

    Journal ref: full version of Progress in Cryptology - AFRICACRYPT 2011, LNCS 6737, pages 21-40

  11. Secure two-party quantum evaluation of unitaries against specious adversaries

    Authors: Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail

    Abstract: We describe how any two-party quantum computation, specified by a unitary which simultaneously acts on the registers of both parties, can be privately implemented against a quantum version of classical semi-honest adversaries that we call specious. Our construction requires two ideal functionalities to garantee privacy: a private SWAP between registers held by the two parties and a classical priva… ▽ More

    Submitted 10 September, 2010; originally announced September 2010.

    Journal ref: Advances in Cryptology, LNCS 6223, pages 685--706 (2010)