Sciweavers

484 search results - page 19 / 97
» Computer-Aided Computing
Sort
View
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Computer-Aided Security Proofs for the Working Cryptographer
Abstract. We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic systems from proof sketches—compact, formal representations of the essence of a...
Gilles Barthe, Benjamin Grégoire, Sylvain H...
VLSID
2009
IEEE
148views VLSI» more  VLSID 2009»
14 years 8 months ago
DFX and Productivity
Robert C. Aitken
CAGD
2008
134views more  CAGD 2008»
13 years 7 months ago
A note on the paper "Normal based subdivision scheme for curve design" by Xunnian Yang
In a recent paper (Computer Aided Geometric Design 23 (3), 243
Luming Liang, Huanxi Zhao, Beiji Zou
VLSID
2009
IEEE
110views VLSI» more  VLSID 2009»
14 years 8 months ago
Security and Dependability of Embedded Systems: A Computer Architects' Perspective
Jörg Henkel, Roshan G. Ragel, Sri Parameswara...
VLSID
2009
IEEE
141views VLSI» more  VLSID 2009»
14 years 8 months ago
A Comparison of Approaches to Carrier Generation for Zigbee Transceivers
Leburu Manojkumar, Arun Mohan, Nagendra Krishnapur...