Sciweavers

4340 search results - page 195 / 868
» Formal Methods and Cryptography
Sort
View
ICFEM
2003
Springer
15 years 9 months ago
A Z Based Approach to Verifying Security Protocols
Abstract. Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be dire...
Benjamin W. Long, Colin J. Fidge, Antonio Cerone
FMCAD
2004
Springer
15 years 8 months ago
Scalable Automated Verification via Expert-System Guided Transformations
Abstract. Transformation-based verification has been proposed to synergistically leverage various transformations to successively simplify and decompose large problems to ones whic...
Hari Mony, Jason Baumgartner, Viresh Paruthi, Robe...
FMCAD
2006
Springer
15 years 8 months ago
Synchronous Elastic Networks
We formally define--at the stream transformer level--a class of synchronous circuits that tolerate any variability in the latency of their environment. We study behavioral properti...
Sava Krstic, Jordi Cortadella, Michael Kishinevsky...
ZUM
1995
Springer
15 years 8 months ago
Testing as Abstraction
as Abstraction Susan Stepney Logica UK Ltd 1 The PROST-Objects project has developed a method for specifying tests. The method is based on systematic abstraction from a `state-plus...
Susan Stepney
FSE
2009
Springer
472views Cryptology» more  FSE 2009»
16 years 5 months ago
Algebraic Techniques in Differential Cryptanalysis
In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic...
Martin Albrecht, Carlos Cid