• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 405
Next 10 →

Using Interface Specifications for Verifying Crypto-protocol Implementations

by Jan Jürjens , 2008
"... An important missing link in the construction of secure systems is finding a practical way to establish a correspondence between a software specification and its implementation. In this paper, we show to make use of interface specifications to address this problem for the case of crypto-based Java ..."
Abstract - Add to MetaCart
An important missing link in the construction of secure systems is finding a practical way to establish a correspondence between a software specification and its implementation. In this paper, we show to make use of interface specifications to address this problem for the case of crypto-based Java

2005: Uncertainty in predictions of the climate response to rising levels of greenhouse gases

by D A Stainforth , T Aina , C Christensen , M Collins , N Faull , D J Frame , J A Kettleborough , S Knight , A Martin , J M Murphy , C Piani , D Sexton , L A Smith , R A Spicer , A J Thorpe , M R Allen - Nature
"... The range of possibilities for future climate evolution 1-3 needs to be taken into account when planning climate change mitigation and adaptation strategies. This requires ensembles of multidecadal simulations to assess both chaotic climate variability and model response uncertainty As a first ste ..."
Abstract - Cited by 175 (9 self) - Add to MetaCart
step towards a probabilistic climate prediction system we have carried out a grand ensemble (an ensemble of ensembles) exploring uncertainty in a state-of-the-art model. Uncertainty in model response is investigated using a perturbed physics ensemble 4 in which model parameters are set to alternative

The PCP theorem by gap amplification

by Irit Dinur - In Proceedings of the Thirty-Eighth Annual ACM Symposium on Theory of Computing , 2006
"... The PCP theorem [3, 2] says that every language in NP has a witness format that can be checked probabilistically by reading only a constant number of bits from the proof. The celebrated equivalence of this theorem and inapproximability of certain optimization problems, due to [12], has placed the PC ..."
Abstract - Cited by 166 (8 self) - Add to MetaCart
constraintsystem, with only a linear blowup in the size of the system. The amplification step causes an increase in alphabet-size that is corrected by a (standard) PCP composition step. Iterative application of these two steps yields a proof for the PCP theorem. The amplification lemma relies on a new notion

Crypto Miracles With Random Oracle

by R. A. Hady, A. V. Agranovsky , 2001
"... Cryptographic theory has provided the notion of provable security which is often unattainable ideal in practice. Theoretical work gains provable secure protocols only at the cost of efficiency. Theorists are moving from certain primitives towards powerful sets of primitives. That happens because pro ..."
Abstract - Add to MetaCart
provable secure protocols often have complex and obscure design, which leads to inefficiency and mistakes. To bridge the gap between cryptographic theory and practice, the Random Oracle Hypothesis was developed. This hypothesis allows to yield crypto protocols much more efficient than standard ones

Verifying Networks of Timed Processes

by Parosh Aziz Abdulla, Bengt Jonsson, Abdulla Bengt Jonsson , 1998
"... Over the last years there has been an increasing research effort directed towards the automatic verification of infinite state systems, such as timed automata, hybrid automata, data-independent systems, relational automata, Petri nets, and lossy channel systems. We present a method for deciding reac ..."
Abstract - Cited by 41 (5 self) - Add to MetaCart
Over the last years there has been an increasing research effort directed towards the automatic verification of infinite state systems, such as timed automata, hybrid automata, data-independent systems, relational automata, Petri nets, and lossy channel systems. We present a method for deciding

Cloud Computing: A step towards CryptoCloud

by unknown authors
"... Abstract: Cloud Computing has become one of the most talked about technologies in the recent times and has thus got a lot of attention from media, organizations, and analysts because of a large number of opportunities it is offering to all.Other ways would be the security services such as computing ..."
Abstract - Add to MetaCart
hash of data and hence integrity of data is verified, encryption and decryption service as provided by the same cloud storage provider, hence the data compromise could not be ruled out because same provider has access to both the security services as well as storage. Divide and rule technique can also

2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications Towards an Ultra Lightweight Crypto Processor

by Begul Bilgin, Elif Bilge Kavun, Tolga Yalcin
"... Abstract—In this paper, a lightweight processor suitable for lightweight cryptographic applications is presented. The processor instruction set is based on the stack-based ZPU architecture. In addition, a simple generic plug-in interface is implemented in order to allow integration of application sp ..."
Abstract - Add to MetaCart
and authentication schemes in a code and area effective way. A simple assembler code is written and tested on the processor in order to verify the functionality of the processor core and coprocessors. The code implements a Davies-Meyer coding scheme and uses the Klein block cipher as a hash function. The GCC toolset

Toward a Verified Generic Prooftool

by Pieter Audenaert
"... Abstract. In this short paper we present an informal report on the effort of the development, specification and verification of a generic Higher-Order-Logic prooftool. Some problems that had to be coped with are discussed in detail. 1 TAMTAM: a Generic Prooftool TAMTAM (”TAbleau-Methods To Analyze M ..."
Abstract - Add to MetaCart
new logics. Since TAMTAM is programmed in the ISO-standard for Prolog [3], one has to define logics based on Prolog-style predicates, thus a basic knowledge of Prolog is absolutely necessary. Our aim is a generic tool that is specified and verified in a formal way. A lot of prooftools are available

Easy Verifiable Primitives and Practical Public

by Key Cryptosystems, David Galindo, Sebastià Martín, Paz Morillo, Jorge L. Villar
"... Abstract. At Crypto’99, Fujisaki and Okamoto [8] presented a nice generic transformation from weak asymmetric and symmetric schemes into an IND-CCA hybrid encryption scheme in the Random Oracle Model. Two specific candidates for standardization were designed from this transformation: PSEC-2 [14] and ..."
Abstract - Add to MetaCart
Abstract. At Crypto’99, Fujisaki and Okamoto [8] presented a nice generic transformation from weak asymmetric and symmetric schemes into an IND-CCA hybrid encryption scheme in the Random Oracle Model. Two specific candidates for standardization were designed from this transformation: PSEC-2 [14

Implementing TLS with Verified Cryptographic Security

by unknown authors
"... Abstract—TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1.2. ..."
Abstract - Add to MetaCart
Abstract—TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1
Next 10 →
Results 1 - 10 of 405
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University