Sciweavers

4340 search results - page 216 / 868
» Formal Methods and Cryptography
Sort
View
96
Voted
CAV
2003
Springer
106views Hardware» more  CAV 2003»
15 years 9 months ago
Enhanced Vacuity Detection in Linear Temporal Logic
Roy Armoni, Limor Fix, Alon Flaisher, Orna Grumber...
114
Voted
FATES
2003
Springer
15 years 9 months ago
Using a Software Testing Technique to Improve Theorem Proving
Most efforts to combine formal methods and software testing go in the direction of exploiting formal methods to solve testing problems, most commonly test case generation. Here we ...
Reiner Hähnle, Angela Wallenburg
IGARSS
2010
15 years 1 months ago
Improved hypoxia modeling for nutrient control decisions in the Gulf of Mexico
Shahid Habib, Ken Pickerring, Maria Tzortziou, Ant...
CORR
2008
Springer
144views Education» more  CORR 2008»
15 years 4 months ago
Modular Compilation of a Synchronous Language
Synchronous languages rely on formal methods to ease the development of applications in an efficient and reusable way. Formal methods have been advocated as a means of increasing t...
Annie Ressouche, Daniel Gaffé, Valér...
CHES
2004
Springer
182views Cryptology» more  CHES 2004»
15 years 10 months ago
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
In the current work we propose a pipelining scheme for implementing Elliptic Curve Cryptosystems (ECC). The scalar multiplication is the dominant operation in ECC. It is computed b...
Pradeep Kumar Mishra