Sciweavers

1302 search results - page 152 / 261
» Free-Style Theorem Proving
Sort
View
IJNSEC
2006
61views more  IJNSEC 2006»
13 years 10 months ago
Is There a Shortage of Primes for Cryptography?
Cryptographic algorithms often prescribe the use of primes whose length in bits is a power of 2. Recently, we proved that for m > 1, there is no prime number with 2m significan...
Samuel S. Wagstaff Jr.
IPL
2006
118views more  IPL 2006»
13 years 10 months ago
Easy intruder deduction problems with homomorphisms
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Stéphanie Delaune
CORR
2007
Springer
125views Education» more  CORR 2007»
13 years 10 months ago
Common knowledge logic in a higher order proof assistant?
This paper presents experiments on common knowledge logic, conducted with the help of the proof assistant Coq. The main feature of common knowledge logic is the eponymous modality...
Pierre Lescanne
JCT
2006
102views more  JCT 2006»
13 years 10 months ago
Minimal bricks
A brick is a 3-connected graph such that the graph obtained from it by deleting any two distinct vertices has a perfect matching. A brick is minimal if for every edge e the deletio...
Serguei Norine, Robin Thomas
ENTCS
2007
107views more  ENTCS 2007»
13 years 10 months ago
Event Domains, Stable Functions and Proof-Nets
We pursue the program of exposing the intrinsic mathematical structure of the “space of proofs” of a logical system [AJ94b]. We study the case of Multiplicative-Additive Linea...
Samson Abramsky