Sciweavers

4340 search results - page 37 / 868
» Formal Methods and Cryptography
Sort
View
ASIACRYPT
2011
Springer
13 years 11 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
ZUM
1992
Springer
15 years 3 months ago
An International Survey of Industrial Applications of Formal Methods
Dan Craigen, Susan L. Gerhart, Ted Ralston
FM
2006
Springer
135views Formal Methods» more  FM 2006»
15 years 3 months ago
A Story About Formal Methods Adoption by a Railway Signaling Manufacturer
Stefano Bacherini, Alessandro Fantechi, Matteo Tem...
FSTTCS
2007
Springer
15 years 6 months ago
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Abstract. The abstraction of cryptographic operations by term algebras, called DolevYao models or symbolic cryptography, is essential in almost all tool-supported methods for provi...
Michael Backes, Markus Dürmuth, Ralf Küs...
ISSAC
2007
Springer
132views Mathematics» more  ISSAC 2007»
15 years 5 months ago
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography
The parallelization of two applications in symmetric cryptography is considered: block ciphering and a new method based on random sampling for the selection of basic substitution ...
Vincent Danjean, Roland Gillard, Serge Guelton, Je...