A domain-specific language for cryptographic protocols based on streams
نویسندگان
چکیده
منابع مشابه
Clap, a Simple Language for Cryptographic Protocols
We describe the design of Clap, a simple speciication language devoted to cryptographic protocols (exclusively). Its main design principle is that it should be not only possible, but relatively easy, to prove security properties of Clap protocols automatically on a machine. To this end, Clap is very restricted. We can think of Clap as isolating what can be thought as a set of essential programm...
متن کاملTeapot: A Domain-Specific Language for Writing Cache Coherence Protocols
ÐIn this paper, we describe Teapot, a domain-specific language for writing cache coherence protocols. Cache coherence is of concern when parallel and distributed systems make local replicas of shared data to improve scalability and performance. In both distributed shared memory systems and distributed file systems, a coherence protocol maintains agreement among the replicated copies as the unde...
متن کاملLanguage, Semantics, and Methods for Cryptographic Protocols
In this report we present a process language for security protocols together with an operational semantics and an alternative semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. This Petri-net semantics has a strong relation to both Paulson’s inductive set o...
متن کاملdeveloping a pattern based on speech acts and language functions for developing materials for the course “ the study of islamic texts translation”
هدف پژوهش حاضر ارائه ی الگویی بر اساس کنش گفتار و کارکرد زبان برای تدوین مطالب درس "بررسی آثار ترجمه شده ی اسلامی" می باشد. در الگوی جدید، جهت تدوین مطالب بهتر و جذاب تر، بر خلاف کتاب-های موجود، از مدل های سطوح گفتارِ آستین (1962)، گروه بندی عملکردهای گفتارِ سرل (1976) و کارکرد زبانیِ هالیدی (1978) بهره جسته شده است. برای این منظور، 57 آیه ی شریفه، به صورت تصادفی از بخش-های مختلف قرآن انتخاب گردید...
15 صفحه اولSome attacks on quantum-based cryptographic protocols
Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, even carefully designed quantum-based cryptographic schemes may be susceptible to subtle attacks that are outside the original design. As an example, we will give a peeking attack against a quantum key distribution scheme based on quantum memory. As a second example, we...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Logic and Algebraic Programming
سال: 2009
ISSN: 1567-8326
DOI: 10.1016/j.jlap.2008.08.006