Sciweavers

384 search results - page 13 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
TCC
2004
Springer
118views Cryptology» more  TCC 2004»
15 years 5 months ago
A General Composition Theorem for Secure Reactive Systems
Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography...
Michael Backes, Birgit Pfitzmann, Michael Waidner
FC
2010
Springer
181views Cryptology» more  FC 2010»
15 years 3 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
ISCAS
1999
IEEE
109views Hardware» more  ISCAS 1999»
15 years 4 months ago
Solution of vector partial differential equations by transfer function models
Transfer function models for the descriptionof physical systems have recently been introduced to the field of multidimensional digital signal processing. They provide an alternati...
Rudolf Rabenstein, Lutz Trautmann
CAV
2009
Springer
212views Hardware» more  CAV 2009»
16 years 8 days ago
Beaver: Engineering an Efficient SMT Solver for Bit-Vector Arithmetic
We present the key ideas in the design and implementation of Beaver, an SMT solver for quantifier-free finite-precision bit-vector logic (QF BV). Beaver uses an eager approach, enc...
Susmit Jha, Rhishikesh Limaye, Sanjit A. Seshia
ELPUB
2006
ACM
15 years 5 months ago
Vectorization of Glyphs and Their Representation in SVG for XML based Processing
This paper shows an approach for converting bitmap images of text glyphs into a vector format which is suitable for being embedded in XML representations of digitized documents. T...
Stefan Pletschacher, Marcel Eckert, Arved C. H&uum...