Sciweavers

819 search results - page 105 / 164
» Fractal symbolic analysis
Sort
View
CADE
2009
Springer
14 years 10 months ago
Computing Knowledge in Security Protocols under Convergent Equational Theories
In the symbolic analysis of security protocols, two classical notions of knowledge, deducibility and indistinguishability, yield corresponding decision problems. We propose a proce...
Stéphanie Delaune, Stefan Ciobâca, St...
ESORICS
2007
Springer
14 years 4 months ago
Adaptive Soundness of Static Equivalence
Abstract. We define a framework to reason about implementations of equational theories in the presence of an adaptive adversary. We particularly focus on soundess of static equiva...
Steve Kremer, Laurent Mazaré
ISSAC
2007
Springer
94views Mathematics» more  ISSAC 2007»
14 years 4 months ago
Faster algorithms for the characteristic polynomial
A new randomized algorithm is presented for computing the characteristic polynomial of an n × n matrix over a field. Over a sufficiently large field the asymptotic expected com...
Clément Pernet, Arne Storjohann
DATE
1999
IEEE
123views Hardware» more  DATE 1999»
14 years 2 months ago
Accounting for Various Register Allocation Schemes During Post-Synthesis Verification of RTL Designs
This paper reports a formal methodology for verifying a broad class of synthesized register-transfer-level (RTL) designs by accommodating various register allocation/optimization ...
Nazanin Mansouri, Ranga Vemuri
USS
2008
14 years 8 days ago
Hypervisor Support for Identifying Covertly Executing Binaries
Hypervisors have been proposed as a security tool to defend against malware that subverts the OS kernel. However, hypervisors must deal with the semantic gap between the low-level...
Lionel Litty, H. Andrés Lagar-Cavilla, Davi...