Sciweavers

2303 search results - page 7 / 461
» The Cryptographic Abstract Machine
Sort
View
FAC
2000
76views more  FAC 2000»
13 years 7 months ago
Natural Semantics-Directed Generation of Compilers and Abstract Machines
s and Abstract Machines Stephan Diehl Universit
Stephan Diehl
POPL
1990
ACM
13 years 11 months ago
The Chemical Abstract Machine
ical Abstract Machine Introduced in and G. Boudol. The chemical abstract machine. Theoretical Computer Science, 96(1):217
Gérard Berry, Gérard Boudol
IACR
2011
116views more  IACR 2011»
12 years 7 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev
FSTTCS
2003
Springer
14 years 18 days ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann