Sciweavers

4340 search results - page 8 / 868
» Formal Methods and Cryptography
Sort
View
FMCAD
2009
Springer
15 years 4 months ago
Verification of recursive methods on tree-like data structures
Jyotirmoy V. Deshmukh, E. Allen Emerson
88
Voted
FM
2008
Springer
157views Formal Methods» more  FM 2008»
14 years 11 months ago
Checking Well-Formedness of Pure-Method Specifications
Arsenii Rudich, Ádám Darvas, Peter M...
IEEEARES
2010
IEEE
15 years 4 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
DCC
2002
IEEE
15 years 9 months ago
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
This contribution is concerned with a generalization of Itoh and Tsujii's algorithm for inversion in extension fields GF(qm ). Unlike the original algorithm, the method introd...
Jorge Guajardo, Christof Paar
95
Voted
CRYPTO
2003
Springer
109views Cryptology» more  CRYPTO 2003»
15 years 2 months ago
Weak Key Authenticity and the Computational Completeness of Formal Encryption
Abstract. A significant effort has recently been made to rigorously relate the formal treatment of cryptography with the computational one. A first substantial step in this dire...
Omer Horvitz, Virgil D. Gligor