Sciweavers

4340 search results - page 7 / 868
» Formal Methods and Cryptography
Sort
View
81
Voted
CCS
2005
ACM
15 years 3 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
15 years 10 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
132
Voted
FM
1998
Springer
345views Formal Methods» more  FM 1998»
15 years 1 months ago
Enriching the Software Development Process by Formal Methods
Manfred Broy, Oscar Slotosch