Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Technological progress in integrated, low-power, CMOS communication devices and sensors makes a rich design space of networked sensors viable. They can be deeply embedded in the p...
Jason L. Hill, Robert Szewczyk, Alec Woo, Seth Hol...
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Abstract. We present EvA2, a comprehensive metaheuristic optimization framework with emphasis on Evolutionary Algorithms. It presents a modular structure of interfaces and abstract...