Logical cryptanalysis as a SAT problem

F Massacci, L Marraro - Journal of Automated Reasoning, 2000 - Springer
Cryptographic algorithms play a key role in computer security and the formal analysis of their
robustness is of utmost importance. Yet, logic and automated reasoning tools are seldom …

Ordered binary decision diagrams and the Davis-Putnam procedure

TE Uribe, ME Stickel - … Conference on Constraints in Computational Logics, 1994 - Springer
We compare two prominent decision procedures for propositional logic: Ordered Binary
Decision Diagrams (Obdd s) and the Davis-Putnam procedure. Experimental results indicate …

Simplification A General Constraint Propagation Technique for Propositional and Modal Tableaux

F Massacci - Automated Reasoning with Analytic Tableaux and …, 1998 - Springer
Tableau and sequent calculi are the basis for most popular interactive theorem provers for
formal verification. Yet, when it comes to automatic proof search, tableaux are often slower …

The Taming of the (X) OR

P Baumgartner, F Massacci - … Conference London, UK, July 24–28, 2000 …, 2000 - Springer
Many key verification problems such as boundedmodel-checking, circuit verification and
logical cryptanalysis are formalized with combined clausal and affine logic (ie clauses with …

Designing arithmetic circuits by refinement in Ruby

G Jones, M Sheeran - Science of computer programming, 1994 - Elsevier
This paper presents in some detail the systematic derivation of a static bit-level parallel
algorithm to implement multiplication of integers, that is to say one which might be …

[HTML][HTML] How to fake an RSA signature by encoding modular root finding as a SAT problem

C Fiorini, E Martinelli, F Massacci - Discrete Applied Mathematics, 2003 - Elsevier
Logical cryptanalysis has been introduced by Massacci and Marraro as a general framework
for encoding properties of crypto-algorithms into SAT problems, with the aim of generating …

Dependent types and formal synthesis

FK Hanna, N Daeche - … of the Royal Society of London …, 1992 - royalsocietypublishing.org
The relative advantages offered by the use of dependent types (rather than polymorphic
ones) in a higher-order logic used for reasoning about digital systems are explored …

Propositional calculus problems in CHIP

H Simonis, M Dincbas - International Conference on Algebraic and Logic …, 1990 - Springer
This paper describes how to model and solve boolean satisfiability problems with the
constraint logic programming language CHIP. Although CHIP has not been developed as a …

[PDF][PDF] Relations and refinement in circuit design

G Jones, M Sheeran - Proc. BCS FACS Workshop on Refinement …, 1991 - researchgate.net
A language of relations and combining forms is presented in which to describe both the
behaviour of circuits and the speci cations which they must meet. We illustrate a design …

[图书][B] Verifiable computer security and hardware: Issues

WD Young - 1991 - cs.utexas.edu
This report explores the influences of hardware on verifiable secure system design and
envisions a mutually beneficial collaboration between the hardware verification and security …