Sciweavers

4340 search results - page 86 / 868
» Formal Methods and Cryptography
Sort
View
142
Voted
TC
2010
14 years 10 months ago
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and Montgomery modular reduction. The algorithms are simple and especially suitable ...
Miroslav Knezevic, Frederik Vercauteren, Ingrid Ve...
132
Voted
FMCO
2006
Springer
103views Formal Methods» more  FMCO 2006»
15 years 7 months ago
Verifying Object-Oriented Programs with KeY: A Tutorial
This paper is a tutorial on performing formal specification and semi-automatic verification of Java programs with the formal software development tool KeY. This tutorial aims to fi...
Wolfgang Ahrendt, Bernhard Beckert, Reiner Hä...
138
Voted
ACNS
2010
Springer
145views Cryptology» more  ACNS 2010»
15 years 7 months ago
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising
Abstract. Web advertisers prefer the cost-per-action (CPA) advertisement model whereby an advertiser pays a web publisher according to the actual amount of transactions, rather tha...
Xuhua Ding
151
Voted
ACST
2006
15 years 5 months ago
Software obfuscation from crackers' viewpoint
Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-cent...
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden
100
Voted
FM
2009
Springer
115views Formal Methods» more  FM 2009»
15 years 10 months ago
Formal Verification of Curved Flight Collision Avoidance Maneuvers: A Case Study
André Platzer, Edmund M. Clarke