Sciweavers

4340 search results - page 4 / 868
» Formal Methods and Cryptography
Sort
View
FC
2009
Springer
93views Cryptology» more  FC 2009»
14 years 4 months ago
Coercion Resistant End-to-end Voting
End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been consi...
Ryan W. Gardner, Sujata Garera, Aviel D. Rubin
CSFW
2009
IEEE
14 years 4 months ago
A Method for Proving Observational Equivalence
—Formal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy (expressed as a reachability pr...
Véronique Cortier, Stéphanie Delaune
ASM
2008
ASM
13 years 11 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
ASIACRYPT
2006
Springer
14 years 1 months ago
The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography
Abstract. The complex multiplication (CM) method for genus 2 is currently the most efficient way of generating genus 2 hyperelliptic curves defined over large prime fields and suit...
Pierrick Gaudry, T. Houtmann, D. Kohel, Christophe...
FM
1997
Springer
325views Formal Methods» more  FM 1997»
14 years 1 months ago
A Meta-Method for Formal Method Integration
We describe a meta-method for formal method integration Pai97 . The approach is applied to combining formal methods with other formal and semiformal methods. We discuss the theory ...
Richard F. Paige