Skip to main content

and
  1. No Access

    Article

    Certain Observations on ACORN v3 and Grain v1—Implications Towards TMDTO Attacks

    It is known that for a stream cipher with state size less than 2.5 times the key size, it is possible to mount a Time-Memory-Data Trade-Off attack with an online complexity lower than the exhaustive key search...

    Akhilesh Anilkumar Siddhanti, Subhamoy Maitra in Journal of Hardware and Systems Security (2019)

  2. Article

    Open Access

    26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3

    Adam J. H. Newton, Alexandra H. Seidenstein, Robert A. McDougal in BMC Neuroscience (2017)

  3. Article

    Open Access

    Predicting surgical outcome in intractable epilepsy using a computational model of seizure initiation

    Nishant Sinha, Justin Dauwels, Yujiang Wang, Sydney S Cash in BMC Neuroscience (2015)

  4. No Access

    Article

    Verification of evolving software via component substitutability analysis

    This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two techniques for checking correctness of ...

    Sagar Chaki, Edmund Clarke, Natasha Sharygina in Formal Methods in System Design (2008)

  5. No Access

    Article

    Concurrent software verification with states, events, and deadlocks

    We present a framework for model checking concurrent software systems which incorporates both states and events. Contrary to other state/event approaches, our work also integrates two powerful verification tec...

    Sagar Chaki, Edmund Clarke, Joël Ouaknine, Natasha Sharygina in Formal Aspects of Computing (2005)