메뉴 건너뛰기




Volumn 3606, Issue , 2005, Pages 79-98

Information flow analysis for VHDL

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; INFORMATION ANALYSIS;

EID: 26844470115     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11535294_8     Document Type: Conference Paper
Times cited : (10)

References (17)
  • 3
    • 21844513842 scopus 로고
    • Reasoning about VHDL using operational and observational semantics
    • CHDM, Springer
    • K. G. W. Goossens. Reasoning About VHDL Using Operational and Observational Semantics. In CHDM, volume 987 of LNCS, pages 311-327. Springer, 1995.
    • (1995) LNCS , vol.987 , pp. 311-327
    • Goossens, K.G.W.1
  • 6
    • 84958768388 scopus 로고    scopus 로고
    • Checking safety properties of behavioral VHDL descriptions by abstract interpretation
    • SAS, Springer
    • C. Hymans. Checking Safety Properties of Behavioral VHDL Descriptions by Abstract Interpretation. In SAS, volume 2477 of LNCS, pages 444-460. Springer, 2002.
    • (2002) LNCS , vol.2477 , pp. 444-460
    • Hymans, C.1
  • 13
    • 26844530463 scopus 로고    scopus 로고
    • Common criteria for information technology security (CC)
    • International Standards Organisation. Common Criteria for information technology security (CC). ISO/IS 15408 Final Committee Draft, version 2.0., 1998.
    • (1998) ISO/IS 15408 Final Committee Draft, Version 2.0.
  • 14
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • SRI International, December
    • J. Rushby. Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International, December 1992.
    • (1992) Technical Report , vol.CSL-92-02
    • Rushby, J.1
  • 16
    • 0035137537 scopus 로고    scopus 로고
    • Structural operational semantics for a portable subset of behavioral VHDL-93
    • K. Thirunarayan and R. L. Ewing. Structural Operational Semantics for a Portable Subset of Behavioral VHDL-93. FMSD, 18(1):69-88, 2001.
    • (2001) FMSD , vol.18 , Issue.1 , pp. 69-88
    • Thirunarayan, K.1    Ewing, R.L.2
  • 17
    • 0003656468 scopus 로고    scopus 로고
    • Hardware performance simulations of round 2 advanced encryption standard algorithms
    • National Security Agency
    • B. Weeks, M. Bean, T. Rozylowicz, and C. Ficke. Hardware performance simulations of round 2 advanced encryption standard algorithms. Technical report, National Security Agency, 2000.
    • (2000) Technical Report
    • Weeks, B.1    Bean, M.2    Rozylowicz, T.3    Ficke, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.