Sciweavers

434 search results - page 12 / 87
» Logical Analysis of Hash Functions
Sort
View
85
Voted
IFIP
1994
Springer
15 years 6 months ago
A Model for Mathematical Analysis of Functional Logic Programs and Their Implementations
Egon Börger, Francisco Javier López-Fr...
123
Voted
TAP
2010
Springer
132views Hardware» more  TAP 2010»
15 years 7 months ago
Relational Analysis of (Co)inductive Predicates, (Co)algebraic Datatypes, and (Co)recursive Functions
This paper presents techniques for applying a finite relational model finder to logical specifications that involve (co)inductive predicates, (co)algebraic datatypes, and (co)re...
Jasmin Christian Blanchette
133
Voted
FMCAD
2004
Springer
15 years 6 months ago
Bloom Filters in Probabilistic Verification
Abstract. Probabilistic techniques for verification of finite-state transition systems offer huge memory savings over deterministic techniques. The two leading probabilistic scheme...
Peter C. Dillinger, Panagiotis Manolios
130
Voted
ACISP
2010
Springer
15 years 21 days ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
TALG
2008
124views more  TALG 2008»
15 years 2 months ago
Uniform deterministic dictionaries
Abstract. We present a new analysis of the well-known family of multiplicative hash functions, and improved deterministic algorithms for selecting "good" hash functions. ...
Milan Ruzic