搜索结果: 1-15 共查到“Symbolic”相关记录66条 . 查询时间(0.08 秒)
Symbolic methods have been used extensively for proving security of cryptographic protocols in the Dolev-Yao model, and more recently for proving security of cryptographic primitives and constructions...
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
Provable security Computationally complete symbolic attacke Vote privacy
2018/6/25
We analyze the FOO electronic voting protocol in the provable secu- rity model using the technique of Computationally Complete Symbolic Attacker (CCSA). The protocol uses commitments, blind signatures...
Symbolic Side-Channel Analysis for Probabilistic Programs
Side-Channel Attacks Quantitative Information Flow Symbolic Execution
2018/4/11
In this paper we describe symbolic side-channel analysis techniques for detecting and quantifying information leakage, given in terms of Shannon and Min Entropy. Measuring the precise leakage is chall...
Symbolic security of garbled circuits
symbolic cryptography garbled circuit formal methods in cryptography
2018/2/8
We present the first computationally sound symbolic analysis of Yao's garbled circuit construction for secure two party computation. Our results include an extension of the symbolic language for crypt...
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption
Modes of encryption symbolic analysis
2017/11/28
Symbolic methods for reasoning about the security of cryptographic systems have for some time concentrated mainly on protocols. More recently, however, we see a rising interest in the use of symbolic ...
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption
Modes of encryption symbolic analysis
2017/11/28
Symbolic methods for reasoning about the security of cryptographic systems have for some time concentrated mainly on protocols. More recently, however, we see a rising interest in the use of symbolic ...
Symbolic Models for Isolated Execution Environments
isolated execution environments trusted hardware symbolic models
2017/2/20
Isolated Execution Environments (IEEs), such as ARM TrustZone and Intel SGX, offer the possibility to execute sensitive code in isolation from other malicious programs, running on the same machine, or...
The 41st International Symposium on Symbolic and Algebraic Computation (ISSAC)
Symbolic Algebraic Computation
2016/7/19
The International Symposium on Symbolic and Algebraic Computation (ISSAC) is the premier conference for research in symbolic computation and computer algebra. ISSAC 2016 will be the 41st meeting in th...
Symbolic Heap Abstraction with Demand-Driven Axiomatization of Memory Invariants
Heap Analysis Relational Static Analysis Array Analysis Memory Invariants
2016/5/24
Many relational static analysis techniques for precise reasoning about heap contents perform an explicit case analysis of all possible heaps that can arise. We argue that such precise relational reaso...
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
formal verification computational security guarantees
2016/1/27
In recent years, a new approach has been developed for verifying security protocols with the aim of combining the benefits of symbolic attackers and the benefits of unconditional soundness: the techni...
We Call It “Our Language”:A Children’s Swahili Pidgin Transforms Social and Symbolic Order on a Remote Hillside in Up-Country Kenyaaeq
Swahili pidgin communicative competence child language identity and ideology language origins and invention
2016/1/26
This study describes a rare Swahili pidgin created by two five-year-old boys, one American and one African. The discussion examines the linguistic and social factors affecting the “origins, maintenanc...
Fix a topological system (X, T), with its space K(X, T) of Tinvariant Borel probabilities. If (Y, S) is a symbolic system (subshift) and ϕ : (Y, S) → (X, T) is a topological extension (factor map...
SYMBOLIC EXTENSION ENTROPY:Cr EXAMPLES,PRODUCTS AND FLOWS
SYMBOLIC EXTENSION ENTROPY Cr EXAMPLES PRODUCTS FLOWS
2015/9/29
Adapting techniques of Misiurewicz, for 1 ≤ r < ∞ we give an explicit construction of Cr maps with positiveresidual entropy. We also establish the behavior of symbolic extension entropy with respect t...
HIDDEN MARKOV PROCESSES IN THE CONTEXT OF SYMBOLIC DYNAMICS
HIDDEN MARKOV PROCESSES SYMBOLIC DYNAMICS
2015/9/29
In an effort to aid communication among different fields and perhaps facilitate progress on problems common toall of them, this article discusses hidden Markov processes from several viewpoints, espec...