-
2
-
-
61949423218
-
Formal verification of a c compiler front-end
-
Accepted. Available at
-
S. Blazy, Z. Dargaye, and X. Leroy. Formal verification of a c compiler front-end. In Proceedings of Formal Methods, 2006. Accepted. Available at http://pauillac.inria.fr/~xleroy/.
-
(2006)
Proceedings of Formal Methods
-
-
Blazy, S.1
Dargaye, Z.2
Leroy, X.3
-
4
-
-
33745191770
-
Compiler verification: A bibliography
-
M. A. Dave. Compiler verification: a bibliography. SIGSOFT Software Engineering Notes, 28(6):2-2, 2003.
-
(2003)
SIGSOFT Software Engineering Notes
, vol.28
, Issue.6
, pp. 2-2
-
-
Dave, M.A.1
-
5
-
-
0003508560
-
Specification for the advanced encryption standard (AES)
-
Federal Information Processing Standards Publication, Technical Report 197, National Institute of Standards and Technology, Nov, Available at
-
Federal Information Processing Standards Publication. Specification for the advanced encryption standard (AES). Technical Report 197, National Institute of Standards and Technology, Nov. 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf.
-
(2001)
-
-
-
6
-
-
34748904574
-
-
R. T. C. for Aeronautics (RTCA). DO-178b: Software considerations in airborne systems and equipment certification, Dec. 1992.
-
R. T. C. for Aeronautics (RTCA). DO-178b: Software considerations in airborne systems and equipment certification, Dec. 1992.
-
-
-
-
8
-
-
34748860783
-
-
D. Greve, R. Richards, and M. Wilding. A summary of intrinsic partitioning verification. In In Proceedings of the Fifth International Workshop on the A CL2 Theorem Prover and Its Applications (ACL2), Austin, TX, Nov. 2004.
-
D. Greve, R. Richards, and M. Wilding. A summary of intrinsic partitioning verification. In In Proceedings of the Fifth International Workshop on the A CL2 Theorem Prover and Its Applications (ACL2), Austin, TX, Nov. 2004.
-
-
-
-
10
-
-
1842473365
-
The verifying compiler: A grand challenge for computing research
-
T. Hoare. The verifying compiler: A grand challenge for computing research. Journal of the ACM, 50(1):63-69, 2003.
-
(2003)
Journal of the ACM
, vol.50
, Issue.1
, pp. 63-69
-
-
Hoare, T.1
-
13
-
-
34748833929
-
-
M. Kaufmann, P. Manolios, and J. S. Moore, editors. Computer Aided Reasoning: ACL2 Case Studies, chapter Chapter 8: High-Speed, Analyzable Simulators. Self-Published, Aug. 2002.
-
M. Kaufmann, P. Manolios, and J. S. Moore, editors. Computer Aided Reasoning: ACL2 Case Studies, chapter Chapter 8: High-Speed, Analyzable Simulators. Self-Published, Aug. 2002.
-
-
-
-
14
-
-
33745189623
-
Formal certification of a compiler back-end or: Programming a compiler with a proof assistant
-
X. Leroy. Formal certification of a compiler back-end or: programming a compiler with a proof assistant. In Principles of Programming Languages (POPL '06), pages 42-54, 2006.
-
(2006)
Principles of Programming Languages (POPL '06)
, pp. 42-54
-
-
Leroy, X.1
-
15
-
-
0004148166
-
-
manual. Available at
-
X. Leroy, D. Doligez, J. Garrigue, D. Rémy, and J. Vouillon. The Objective Caml system: Documentation and user's manual. Available at http://caml.inria.fr/pub/docs/manual-ocaml/index.html, 2005.
-
(2005)
The Objective Caml system: Documentation and user's
-
-
Leroy, X.1
Doligez, D.2
Garrigue, J.3
Rémy, D.4
Vouillon, J.5
-
16
-
-
3142691374
-
-
J. R. Lewis and W. B. Martin. Cryptol: High assurance, retargetable crypto development and validation. In Proceedings of the IEEE/AFCEA Conference on Military Communications (MILCOM), Boston, MA, Oct. 2003. Available at http://www.galois.com/files/milcom.pdf.
-
J. R. Lewis and W. B. Martin. Cryptol: High assurance, retargetable crypto development and validation. In Proceedings of the IEEE/AFCEA Conference on Military Communications (MILCOM), Boston, MA, Oct. 2003. Available at http://www.galois.com/files/milcom.pdf.
-
-
-
-
17
-
-
34748899321
-
Verification condition generation via theorem proving
-
Submitted, Mar
-
J. Matthews, J. S. Moore, S. Ray, and D. Vroon. Verification condition generation via theorem proving. Submitted, Mar. 2006.
-
(2006)
-
-
Matthews, J.1
Moore, J.S.2
Ray, S.3
Vroon, D.4
-
18
-
-
0024882264
-
A mechanically verified language implementation
-
J. S. Moore. A mechanically verified language implementation. Journal of Automated Reasoning, 5(4):461-492, 1989.
-
(1989)
Journal of Automated Reasoning
, vol.5
, Issue.4
, pp. 461-492
-
-
Moore, J.S.1
-
19
-
-
85067648530
-
A grand challenge proposal for formal methods: A verified stack
-
J. S. Moore. A grand challenge proposal for formal methods: A verified stack. In 10th Anniversary Colloquium of UNU/IIST, pages 161-172, 2002.
-
(2002)
10th Anniversary Colloquium of UNU/IIST
, pp. 161-172
-
-
Moore, J.S.1
-
20
-
-
0348126394
-
Isabelle/HOL -A Proof Assistant for Higher-Order Logic
-
of, Springer
-
T. Nipkow, L. C. Paulson, and M. Wenzel. Isabelle/HOL -A Proof Assistant for Higher-Order Logic, volume 2283 of LNCS. Springer, 2002.
-
(2002)
LNCS
, vol.2283
-
-
Nipkow, T.1
Paulson, L.C.2
Wenzel, M.3
-
21
-
-
84974143149
-
Implementing lazy functional languages on stock hardware: The Spineless Tagless G-machine
-
Apr
-
S. L. Peyton Jones. Implementing lazy functional languages on stock hardware: The Spineless Tagless G-machine. Journal of Functional Programming, 2(2):127-202, Apr. 1992.
-
(1992)
Journal of Functional Programming
, vol.2
, Issue.2
, pp. 127-202
-
-
Peyton Jones, S.L.1
-
22
-
-
34248401342
-
Haskell 98 Language and Libraries
-
S. L. Peyton-Jones, editor, Cambridge University Press, Available at
-
S. L. Peyton-Jones, editor. Haskell 98 Language and Libraries: The Revised Report. Cambridge University Press, 2003. Available at http://www.haskell.org/definition/haskell98-report.ps.gz.
-
(2003)
The Revised Report
-
-
-
23
-
-
34748849149
-
-
R. L. Rivest1, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. The security of the rc6 block cipher. Technical report, RSA Security, 1998.
-
R. L. Rivest1, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. The security of the rc6 block cipher. Technical report, RSA Security, 1998.
-
-
-
-
24
-
-
85034992300
-
Designing regular array architectures using higher order functions
-
J.-P. Jouannaud, editor, Proceedings of the International Conference on Functional Programming Languages and Computer Architecture FPCA, Nancy, France, of, Springer
-
M. Sheeran. Designing regular array architectures using higher order functions. In J.-P. Jouannaud, editor, Proceedings of the International Conference on Functional Programming Languages and Computer Architecture (FPCA), Nancy, France, volume 201 of LNCS, pages 220-237. Springer, 1985.
-
(1985)
LNCS
, vol.201
, pp. 220-237
-
-
Sheeran, M.1
-
26
-
-
34748859041
-
-
M. B. Shields. μCryptol Reference Manual, Nov. 2005. Available at http://www.galois.com/files/mCryptol_rfman-0.9.pdf.
-
M. B. Shields. μCryptol Reference Manual, Nov. 2005. Available at http://www.galois.com/files/mCryptol_rfman-0.9.pdf.
-
-
-
-
29
-
-
84869815133
-
TEA, a tiny encryption algorithm
-
B. Preneel, editor, Proceedings of the 1994 Workshop on Fast Software Encryption FSE, Belgium, of, Springer
-
D. J. Wheeler and R. M. Needham. TEA, a tiny encryption algorithm. In B. Preneel, editor, Proceedings of the 1994 Workshop on Fast Software Encryption (FSE), Belgium, volume 1008 of LNCS, pages 363-366. Springer, 1995.
-
(1995)
LNCS
, vol.1008
, pp. 363-366
-
-
Wheeler, D.J.1
Needham, R.M.2
|