Sciweavers

2303 search results - page 18 / 461
» The Cryptographic Abstract Machine
Sort
View
LPAR
2005
Springer
14 years 27 days ago
Model Checking Abstract State Machines with Answer Set Programming
ECKING ABSTRACT STATE MACHINES WITH ANSWER SET PROGRAMMING by Calvin Kai Fan Tang B.Sc., Simon Fraser University, 2003 a thesis submitted in partial fulfillment of the requirements...
Calvin Kai Fan Tang, Eugenia Ternovska
CSL
2004
Springer
14 years 24 days ago
Complete Lax Logical Relations for Cryptographic Lambda-Calculi
Abstract. Security properties are profitably expressed using notions of contextual equivalence, and logical relations are a powerful proof technique to establish contextual equiva...
Jean Goubault-Larrecq, Slawomir Lasota, David Nowa...
FOSSACS
2006
Springer
13 years 11 months ago
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Abstract. Web services are an important series of industry standards for adding semantics to web-based and XML-based communication, in particular among enterprises. Like the entire...
Michael Backes, Sebastian Mödersheim, Birgit ...
JOC
2000
78views more  JOC 2000»
13 years 7 months ago
Practical Aspects of Quantum Cryptographic Key Distribution
Abstract. Performance of various experimental realizations of quantum cryptographic protocols using polarization or phase coding are compared, including a new self-balanced interfe...
Hugo Zbinden, Nicolas Gisin, B. Huttner, A. Muller...
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Computer-Aided Security Proofs for the Working Cryptographer
Abstract. We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic systems from proof sketches—compact, formal representations of the essence of a...
Gilles Barthe, Benjamin Grégoire, Sylvain H...