Sciweavers

300 search results - page 8 / 60
» Formal Methods for Smartcard Security
Sort
View
83
Voted
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
15 years 4 months ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
64
Voted
FM
2003
Springer
115views Formal Methods» more  FM 2003»
15 years 3 months ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
85
Voted
ENTCS
2006
145views more  ENTCS 2006»
14 years 10 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
IEEEARES
2006
IEEE
15 years 4 months ago
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF
Abstract— Most e-government applications have to find a solution for simple, reliable, secure and authentic signing of official documents. Citizens need a simple way to verify ...
Thomas Neubauer, Edgar Weippl, Stefan Biffl
AMAST
2004
Springer
15 years 3 months ago
Counting Votes with Formal Methods
This abstract provides some background information about the electronic voting experiment that is planned in the Netherlands for the European Elections of 2004, and about our own i...
Bart Jacobs