Sciweavers

4340 search results - page 138 / 868
» Formal Methods and Cryptography
Sort
View
JAVACARD
2000
15 years 7 months ago
Formal Specification and Verification of JavaCard's Application Identifier Class
Abstract This note discusses a verification in PVS of the AID (Application Identifier) class from JavaCard's API. The properties that are verified are formulated in the interf...
Joachim van den Berg, Bart Jacobs, Erik Poll
FSE
2009
Springer
107views Cryptology» more  FSE 2009»
15 years 10 months ago
Multidimensional Extension of Matsui's Algorithm 2
Matsui’s one-dimensional Alg. 2 can be used for recovering bits of the last round key of a block cipher. In this paper a truly multidimensional extension of Alg. 2 based on estab...
Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
IPPS
2005
IEEE
15 years 9 months ago
Generic Design Space Exploration for Reconfigurable Architectures
We propose in this paper an original design space exploration method for reconfigurable architectures adapted to fine and coarse grain resources. The exploration flow deals with c...
Lilian Bossuet, Guy Gogniat, Jean Luc Philippe
FMCAD
2000
Springer
15 years 7 months ago
Monitor-Based Formal Specification of PCI
Bus protocols are hard to specify correctly, and yet it is often critical and highly beneficial that their specifications are correct, complete, and unambiguous. The informal speci...
Kanna Shimizu, David L. Dill, Alan J. Hu
ISARCS
2010
156views Hardware» more  ISARCS 2010»
15 years 6 months ago
A Road to a Formally Verified General-Purpose Operating System
Methods of formal description and verification represent a viable way for achieving fundamentally bug-free software. However, in reality only a small subset of the existing operati...
Martin Decký