Sciweavers

4340 search results - page 44 / 868
» Formal Methods and Cryptography
Sort
View
TLDI
2009
ACM
108views Formal Methods» more  TLDI 2009»
15 years 8 months ago
Secure compilation of a multi-tier web language
Storing state in the client tier (in forms or cookies, for example) improves the efficiency of a web application, but it also renders the secrecy and integrity of stored data vul...
Ioannis G. Baltopoulos, Andrew D. Gordon
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 5 months ago
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods
Abstract. A number of papers on side-channel attacks have been published where the side-channel information was not exploited in an optimal manner, which reduced their efficiency. ...
Werner Schindler
CSFW
2010
IEEE
15 years 3 months ago
A Machine-Checked Formalization of Sigma-Protocols
—Zero-knowledge proofs have a vast applicability in the domain of cryptography, stemming from the fact that they can be used to force potentially malicious parties to abide by th...
Gilles Barthe, Daniel Hedin, Santiago Zanella B&ea...
ASIAN
2006
Springer
134views Algorithms» more  ASIAN 2006»
15 years 3 months ago
Computational Soundness of Formal Indistinguishability and Static Equivalence
In the investigation of the relationship between the formal and the computational view of cryptography, a recent approach, first proposed in [10], uses static equivalence from cryp...
Gergei Bana, Payman Mohassel, Till Stegers
ICSE
1997
IEEE-ACM
15 years 3 months ago
Introducing Formal Specification Methods in Industrial Practice
Formal specification methods are not often applied in industrial projects, despite their advantages and the maturity of theories and tools. The scarce familiarity of practitioners...
Luciano Baresi, Alessandro Orso, Mauro Pezzè...