![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Certain Observations on ACORN v3 and Grain v1—Implications Towards TMDTO Attacks
It is known that for a stream cipher with state size less than 2.5 times the key size, it is possible to mount a Time-Memory-Data Trade-Off attack with an online complexity lower than the exhaustive key search...
-
Article
Open Access26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3
-
Article
Open AccessPredicting surgical outcome in intractable epilepsy using a computational model of seizure initiation
-
Article
Verification of evolving software via component substitutability analysis
This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two techniques for checking correctness of ...
-
Article
Concurrent software verification with states, events, and deadlocks
We present a framework for model checking concurrent software systems which incorporates both states and events. Contrary to other state/event approaches, our work also integrates two powerful verification tec...