Sciweavers

237 search results - page 41 / 48
» Modular Monad Transformers
Sort
View
EMSOFT
2004
Springer
13 years 11 months ago
A methodology for generating verified combinatorial circuits
High-level programming languages offer significant expressivity but provide little or no guarantees about resource use. Resourcebounded languages -- such as hardware-description l...
Oleg Kiselyov, Kedar N. Swadi, Walid Taha
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
EMSOFT
2006
Springer
13 years 11 months ago
Polychronous mode automata
Among related synchronous programming principles, the model of computation of the Polychrony workbench stands out by its capability to give high-level description of systems where...
Jean-Pierre Talpin, Christian Brunette, Thierry Ga...
FASE
2006
Springer
13 years 11 months ago
Concerned About Separation
Abstract. The separation of concerns, as a conceptual tool, enables us to manage the complexity of the software systems that we develop. There have been a number of approaches aime...
Hafedh Mili, Houari A. Sahraoui, Hakim Lounis, Ham...
FSE
2006
Springer
124views Cryptology» more  FSE 2006»
13 years 11 months ago
Improved Linear Distinguishers for SNOW 2.0
In this paper we present new and more accurate estimates of the biases of the linear approximation of the FSM of the stream cipher SNOW 2.0. Based on improved bias estimates we als...
Kaisa Nyberg, Johan Wallén