Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Arthur Blot"'
Autor:
José B. Almeida, Gilles Barthe, Benedikt Schmidt, Pierre-Yves Strub, Benjamin Grégoire, Vincent Laporte, Hugo Pacheco, Tiago Oliveira, Arthur Blot, Manuel Barbosa
Publikováno v:
CCS
CCS 2017-Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
CCS 2017-Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Oct 2017, Dallas, United States. pp.1-17
CCS 2017-Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
CCS 2017-Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Oct 2017, Dallas, United States. pp.1-17
International audience; Jasmin is a framework for developing high-speed and high-assurance cryptographic software. The framework is structured around the Jasmin programming language and its compiler. The language is designed for enhancing portability
Publikováno v:
Numerical Software Verification: 10th International Workshop, NSV 2017 Heidelberg, Germany, July 22–23, 2017 Proceedings
Numerical Software Verification
Numerical Software Verification, Jul 2017, Heidelberg, Germany
Numerical Software Verification ISBN: 9783319635002
NSV@CAV
Numerical Software Verification
Numerical Software Verification, Jul 2017, Heidelberg, Germany
Numerical Software Verification ISBN: 9783319635002
NSV@CAV
We present a full Coq formalisation of the correctness of some comparison algorithms between binary64 and decimal64 floating-point numbers, using computation intensive proofs and a continued fractions library built for this formalisation.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::12fbda6a2bd3e3409d718b96abfaf19c
https://hal.science/hal-01512294/file/paper.pdf
https://hal.science/hal-01512294/file/paper.pdf
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662544549
POST
POST
A promising approach to defend against side channel attacks is to build programs that are leakage resilient, in a formal sense. One such formal notion of leakage resilience is the n-threshold-probing model proposed in the seminal work by Ishai et al.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8c84a7cd118c894f700c6d54053ab55a
https://doi.org/10.1007/978-3-662-54455-6_13
https://doi.org/10.1007/978-3-662-54455-6_13
Publikováno v:
Functional and Logic Programming ISBN: 9783319296036
FLOPS
FLOPS 2016
FLOPS 2016, Mar 2016, Kochi, Japan
FLOPS
FLOPS 2016
FLOPS 2016, Mar 2016, Kochi, Japan
International audience; Computer Science abounds in folktales about how — in the early days of computer programming — bit vectors were ingeniously used to encode and manipulate finite sets. Algorithms have thus been developed to minimize memory f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2758801c63cec0d1570f6de18aee334c
https://doi.org/10.1007/978-3-319-29604-3_2
https://doi.org/10.1007/978-3-319-29604-3_2