Sciweavers

2303 search results - page 15 / 461
» The Cryptographic Abstract Machine
Sort
View
TCS
2008
13 years 7 months ago
Using bisimulation proof techniques for the analysis of distributed abstract machines
Analysis of Distributed Abstract Machines Damien Pous ENS Lyon, France. We illustrate the use of recently developed proof techniques for weak bisimulation sing a generic framework...
Damien Pous
MFPS
1993
13 years 11 months ago
A Chemical Abstract Machine for Graph Reduction
al abstract machine for graph reduction Alan Jeffrey Report 3/92 August 1992 Computer Science School of Cognitive and Computing Sciences University of Sussex Brighton BN1 9QH ISSN ...
Alan Jeffrey
POS
1989
Springer
13 years 11 months ago
The Persistent Abstract Machine
ro, D.S. “The Persistent Abstract Machine Version 10 / Napier88 (Release 2.0)”. Universities of St Andrews and Adelaide (1994).
Richard C. H. Connor, Alfred L. Brown, Raymund Car...
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
14 years 1 months ago
Obfuscation for Cryptographic Purposes
Abstract. An obfuscation O of a function F should satisfy two requirements: firstly, using O it should be possible to evaluate F; secondly, O should not reveal anything about F th...
Dennis Hofheinz, John Malone-Lee, Martijn Stam
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
13 years 11 months ago
Implementing Cryptographic Pairings on Smartcards
Abstract. Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations...
Michael Scott, Neil Costigan, Wesam Abdulwahab