Sciweavers

2303 search results - page 7 / 461
» The Cryptographic Abstract Machine
Sort
View
FAC
2000
76views more  FAC 2000»
15 years 2 months ago
Natural Semantics-Directed Generation of Compilers and Abstract Machines
s and Abstract Machines Stephan Diehl Universit
Stephan Diehl
129
Voted
POPL
1990
ACM
15 years 6 months ago
The Chemical Abstract Machine
ical Abstract Machine Introduced in and G. Boudol. The chemical abstract machine. Theoretical Computer Science, 96(1):217
Gérard Berry, Gérard Boudol
146
Voted
IACR
2011
116views more  IACR 2011»
14 years 2 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev
FSTTCS
2003
Springer
15 years 7 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann