Sciweavers

915 search results - page 48 / 183
» Proof labeling schemes
Sort
View
CAV
1998
Springer
175views Hardware» more  CAV 1998»
14 years 5 days ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
IACR
2011
132views more  IACR 2011»
12 years 7 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
CRYPTO
2000
Springer
139views Cryptology» more  CRYPTO 2000»
14 years 8 days ago
On the Exact Security of Full Domain Hash
Abstract. The Full Domain Hash (FDH) scheme is a RSA-based signature scheme in which the message is hashed onto the full domain of the RSA function. The FDH scheme is provably secu...
Jean-Sébastien Coron
ITP
2010
172views Mathematics» more  ITP 2010»
13 years 11 months ago
Equations: A Dependent Pattern-Matching Compiler
Abstract. We present a compiler for definitions made by pattern matching on inductive families in the Coq system. It allows to write structured, recursive dependently-typed functi...
Matthieu Sozeau
ICIP
2008
IEEE
14 years 9 months ago
Shot classification for action movies based on motion characteristics
In this paper, we propose a shot classification method for action movies. Considering that motion characteristic is very important for semantic movie analysis, and it contains abu...
Shuhui Wang, Shuqiang Jiang, Qingming Huang, Wen G...