Sciweavers

FLOPS
2004
Springer
14 years 3 months ago
Sub-Birkhoff
Vincent van Oostrom
FLOPS
2004
Springer
14 years 3 months ago
Multivariant Non-failure Analysis via Standard Abstract Interpretation
Francisco Bueno, Pedro López-García,...
FLOPS
2004
Springer
14 years 3 months ago
Set-Sharing Is Not Always Redundant for Pair-Sharing
Sharing among program variables is vital information when analyzing logic programs. This information is often expressed either as sets or as pairs of program variables that (may) s...
Francisco Bueno, Maria J. García de la Band...
FLOPS
2004
Springer
14 years 3 months ago
Complete Axiomatization of an Algebraic Construction of Graphs
This paper presents a complete (infinite) axiomatization for an algebraic construction of graphs, in which a finite fragment denotes the class of graphs with bounded tree width.
Mizuhito Ogawa
FLOPS
2004
Springer
14 years 3 months ago
Backward Pair Sharing Analysis
This paper presents a backward sharing analysis for logic programs. The analysis computes pre-conditions for a query that guarantee a given post-condition is satisfied after the q...
Lunjin Lu, Andy King
CARDIS
2004
Springer
94views Hardware» more  CARDIS 2004»
14 years 3 months ago
Place and Route for Secure Standard Cell Design
Kris Tiri, Ingrid Verbauwhede
CARDIS
2004
Springer
93views Hardware» more  CARDIS 2004»
14 years 3 months ago
On-the-Fly Metadata Stripping for Embedded Java Operating Systems
Considering the typical amount of memory available on a smart card, it is essential to minimize the size of the runtime environment to leave as much memory as possible to applicati...
Christophe Rippert, Damien Deville
CARDIS
2004
Springer
149views Hardware» more  CARDIS 2004»
14 years 3 months ago
Differential Power Analysis Model and Some Results
CMOS gates consume different amounts of power whether their output has a falling or a rising edge. Therefore the overall power consumption of a CMOS circuit leaks information about...
Sylvain Guilley, Philippe Hoogvorst, Renaud Pacale...
CARDIS
2004
Springer
97views Hardware» more  CARDIS 2004»
14 years 3 months ago
On the Security of the DeKaRT Primitive
DeKaRT primitives are key-dependent reversible circuits presented at CHES 2003. According to the author, the circuits described are suitable for data scrambling but also as buildin...
Gilles Piret, François-Xavier Standaert, Ga...
CARDIS
2004
Springer
150views Hardware» more  CARDIS 2004»
14 years 3 months ago
Enforcing High-Level Security Properties for Applets
Smart card applications often handle privacy-sensitive information, and therefore must obey certain security policies. Typically, such policies are described as high-level security...
Mariela Pavlova, Gilles Barthe, Lilian Burdy, Mari...