France

Results: 47775



#Item
31European Union law / European Union directives / Economy / Finance / Investment / Undertakings for Collective Investment in Transferable Securities Directive / Financial regulation / Corporate law / Systemic risk / Framework decision / Alternative Investment Fund Managers Directive

France: New Law on Banking and Financial Regulation

Add to Reading List

Source URL: www.loc.gov

Language: English - Date: 2014-04-16 16:02:08
32Software development / Aspect-oriented software development / Aspect-oriented programming / Formal methods / Logic in computer science / Runtime verification / Pointcut / Formal verification / Join point / Instrumentation

A Tutorial on Runtime Verification Yli`es FALCONE a , Klaus HAVELUND b,1 and Giles REGER c,2 a University of Grenoble I (UJF), Laboratoire d’Informatique de Grenoble, France b Jet Propulsion Laboratory, California Inst

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2012-12-17 05:23:36
33Cryptography / NIST hash function competition / Cryptographic hash functions / MerkleDamgrd construction / SIMD / CubeHash / Hash function / SHA-3 / Block cipher

Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique, 45 rue d’Ulm, 75230 Paris Cedex 05, France {Charles.Bouillaguet,Gaet

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
34Cryptography / Data Encryption Standard / Lucifer / ICE / Block cipher / Feistel cipher / MISTY1 / NC

Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version? )?? Anne Canteaut, S´ebastien Duval, and Ga¨etan Leurent Inria, project-team SECRET, France {Anne.Canteaut, Sebastien.Duval, Gaetan.

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
35Cryptography / Permutation / SIMD / Data Encryption Standard / Feistel cipher / Permutation polynomial / Block cipher

Tweaking SIMD Gaëtan Leurent, Pierre-Alain Fouque, Charles Bouillaguet École Normale Supérieure – Département d’Informatique, 45 rue d’Ulm, 75230 Paris Cedex 05, France {Gaetan.Leurent,Pierre-Alain.France,Charl

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
36Cryptography / Block cipher modes of operation / Block cipher / Chosen-plaintext attack / Authenticated encryption / Cryptanalysis / Galois/Counter Mode / Chosen-ciphertext attack / Advanced Encryption Standard / OCB mode / Data Encryption Standard / Book:Cryptography 1

Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, France

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
37Computing / Software engineering / Computer programming / Data types / C++ / C / Primitive types / Software bugs / Pointer / Struct / Memory safety / C dynamic memory allocation

Runtime Detection of Temporal Memory Errors? Kostyantyn Vorobyov, Nikolai Kosmatov, Julien Signoles, and Arvid Jakobsson CEA, LIST, Software Reliability and Security Laboratory, PC 174, 91191 Gif-sur-Yvette France {kosty

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-09-15 19:04:17
38Cryptography / Data Encryption Standard / Linear cryptanalysis / Differential cryptanalysis / Block cipher / Salsa20 / Cryptanalysis / Differential-linear attack / NC / Boomerang attack / Stream cipher / E0

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
39Mathematics / Theoretical computer science / Constraint programming / Functions and mappings / Electronic design automation / Logic in computer science / NP-complete problems / Satisfiability modulo theories / Rounding / Limit of a function / Function

Real Behavior of Floating Point Numbers * Bruno Marre1 , Fran¸cois Bobot1 , and Zakaria Chihani1 CEA LIST, Software Security Lab, Gif-sur-Yvette, France

Add to Reading List

Source URL: smt-workshop.cs.uiowa.edu

Language: English - Date: 2017-09-02 14:08:49
UPDATE