Sciweavers

4340 search results - page 116 / 868
» Formal Methods and Cryptography
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 10 months ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
ANTS
2004
Springer
111views Algorithms» more  ANTS 2004»
15 years 9 months ago
A Method to Solve Cyclotomic Norm Equations
We present a technique to recover f ∈ Q(ζp) where ζp is a primitive pth root of unity for a prime p, given its norm g = f ∗ ¯f in the totally real field Q(ζp + ζ−1 p )....
Nick Howgrave-Graham, Michael Szydlo
IFM
1999
Springer
15 years 8 months ago
Modelling Discrete Behaviour in a Continuous-Time Formalism
Embedded real-time systems consist of a digital controller interacting with its physical environment. Developing such systems therefore involves specifying and reasoning about bot...
Colin J. Fidge
ACSAC
1996
IEEE
15 years 8 months ago
Formal Techniques for an ITSEC-E4 Secure Gateway
In this paper we describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with t...
Pierre Bieber
EDCC
2005
Springer
15 years 9 months ago
Formal Safety Analysis of a Radio-Based Railroad Crossing Using Deductive Cause-Consequence Analysis (DCCA)
Abstract. In this paper we present the formal safety analysis of a radiobased railroad crossing. We use deductive cause-consequence analysis (DCCA) as analysis method. DCCA is a no...
Frank Ortmeier, Wolfgang Reif, Gerhard Schellhorn