Abstract
Gem #49 is the tenth chapter of John Barnes' new booklet: Safe and Secure Software: An Introduction to Ada 2005.
Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet.
Index Terms
Gem #49: safe and secure software: chapter 10, safe concurrency
Recommendations
GEM: A Generic Chosen-Ciphertext Secure Encryption Method
CT-RSA '02: Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in CryptologyThis paper proposes an efficient and provably secure transform to encrypt a message with any asymmetric one-way cryptosystem. The resulting scheme achieves adaptive chosen-ciphertext security in the random oracle model.Compared to previous known generic ...
Gem #43: safe and secure software: chapter 7, safe memory management
Welcome back the Ada Gems series! We hope you had a great summer.
Gem #43 is the seventh chapter of John Barnes' new booklet: Safe and Secure Software: An Introduction to Ada 2005.
Over the coming months, we will be publishing all thirteen chapters of ...
Gem #47: safe and secure software: chapter 9, safe communication
Gem #47 is the ninth chapter of John Barnes' new booklet: Safe and Secure Software: An Introduction to Ada 2005.
Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can ...






Comments