Sciweavers

4047 search results - page 31 / 810
» Algebraic Model Checking
Sort
View
ICCAD
2005
IEEE
160views Hardware» more  ICCAD 2005»
14 years 6 months ago
Equivalence verification of polynomial datapaths with fixed-size bit-vectors using finite ring algebra
— This paper addresses the problem of equivalence verification of RTL descriptions. The focus is on datapathoriented designs that implement polynomial computations over fixed-s...
Namrata Shekhar, Priyank Kalla, Florian Enescu, Si...
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
14 years 1 months ago
Computing the Algebraic Immunity Efficiently
The purpose of algebraic attacks on stream and block ciphers is to recover the secret key by solving an overdefined system of multivariate algebraic equations. They become very eff...
Frédéric Didier, Jean-Pierre Tillich
ICST
2008
IEEE
14 years 4 months ago
Testing Java Components based on Algebraic Specifications
This paper presents a method of component testing based on algebraic specifications. An algorithm for generating checkable test cases is proposed. A prototype testing tool called ...
Bo Yu, Liang Kong, Yufeng Zhang, Hong Zhu
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 10 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
JUCS
2010
215views more  JUCS 2010»
13 years 4 months ago
A Multidisciplinary Survey of Computational Techniques for the Modelling, Simulation and Analysis of Biochemical Networks
: All processes of life are controlled by networks of interacting biochemical components. The purpose of modelling these networks is manifold. From a theoretical point of view it a...
James Decraene, Thomas Hinze