Sciweavers

1173 search results - page 135 / 235
» On the Compositionality of Round Abstraction
Sort
View
ICST
2009
IEEE
14 years 10 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
FSE
2011
Springer
263views Cryptology» more  FSE 2011»
14 years 4 months ago
Practical Near-Collisions on the Compression Function of BMW
Abstract. Blue Midnight Wish (BMW) is one of the fastest SHA-3 candidates in the second round of the competition. In this paper we study the compression function of BMW and we obta...
Gaëtan Leurent, Søren S. Thomsen
CADE
2008
Springer
16 years 29 days ago
Modularity of Confluence
We present a novel proof of Toyama's famous modularity of confluence result for term rewriting systems. Apart from being short and intuitive, the proof is modular itself in th...
Vincent van Oostrom
RTSS
2009
IEEE
15 years 7 months ago
Distributed, Modular HTL
Abstract—The Hierarchical Timing Language (HTL) is a realtime coordination language for distributed control systems. HTL programs must be checked for well-formedness, race freedo...
Thomas A. Henzinger, Christoph M. Kirsch, Eduardo ...
110
Voted
CAI
2009
Springer
15 years 7 months ago
The Graph Programming Language GP
Abstract. GP (for Graph Programs) is a rule-based, nondeterministic programming language for solving graph problems at a high level of abstraction, freeing programmers from handlin...
Detlef Plump