Sciweavers

25 search results - page 2 / 5
» arts 1997
Sort
View
IMA
1997
Springer
106views Cryptology» more  IMA 1997»
13 years 9 months ago
Hash Functions and MAC Algorithms Based on Block Ciphers
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It discusses the main requirements for these cryptographic primitives, motivates these...
Bart Preneel
ARTS
1997
Springer
13 years 9 months ago
Regular Processes and Timed Automata
In 10 , an algebra for timed automata has been introduced. In this article, we introduce a syntactic characterisation of nite timed automata in terms of that process algebra. We s...
Pedro R. D'Argenio
RTA
1997
Springer
13 years 9 months ago
Proving Innermost Normalisation Automatically
We present a technique to prove innermost normalisation of term rewriting systems TRSs automatically. In contrast to previous methods, our technique is able to prove innermost n...
Thomas Arts, Jürgen Giesl
COMPSAC
1997
IEEE
13 years 9 months ago
The use of industrial-strength formal methods
Formal methods are used in a surprisingly wide variety of applications and ways throughout the world. While they may still’be considered a niche market, there is growing evidenc...
Jonathan P. Bowen, Michael G. Hinchey
ARTS
1997
Springer
13 years 9 months ago
The Verus Language: Representing Time Efficiently with BDDs
There have been significant advances on formal methods to verify complex systems recently. Nevertheless, these methods have not yet been accepted as a realistic alternative to the ...
Sérgio Vale Aguiar Campos, Edmund M. Clarke