Skip to main content

Showing 1–4 of 4 results for author: Bruni, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.01375  [pdf, ps, other

    cs.LO

    Skolemisation for Intuitionistic Linear Logic

    Authors: Alessandro Bruni, Eike Ritter, Carsten Schürmann

    Abstract: Focusing is a known technique for reducing the number of proofs while preserving derivability. Skolemisation is another technique designed to improve proof search, which reduces the number of back-tracking steps by representing dependencies on the term level and instantiate witness terms during unification at the axioms or fail with an occurs-check otherwise. Skolemisation for classical logic is w… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: to appear at IJCAR 2024

  2. arXiv:2403.13700  [pdf, other

    cs.LO

    Taming Differentiable Logics with Coq Formalisation

    Authors: Reynald Affeldt, Alessandro Bruni, Ekaterina Komendantskaya, Natalia Ślusarz, Kathrin Stark

    Abstract: For performance and verification in machine learning, new methods have recently been proposed that optimise learning systems to satisfy formally expressed logical properties. Among these methods, differentiable logics (DLs) are used to translate propositional or first-order formulae into loss functions deployed for optimisation in machine learning. At the same time, recent attempts to give program… ▽ More

    Submitted 5 July, 2024; v1 submitted 20 March, 2024; originally announced March 2024.

    Comments: Conference Submission (ITP'24)

    ACM Class: F.3.1; I.2.6

  3. arXiv:2007.11427  [pdf, ps, other

    cs.CR cs.NI

    Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices

    Authors: Karl Norrman, Vaishnavi Sundararajan, Alessandro Bruni

    Abstract: Constrained IoT devices are becoming ubiquitous in society and there is a need for secure communication protocols that respect the constraints under which these devices operate. EDHOC is an authenticated key establishment protocol for constrained IoT devices, currently being standardized by the Internet Engineering Task Force (IETF). A rudimentary version of EDHOC with only two key establishment m… ▽ More

    Submitted 15 July, 2021; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: 12 pages; version 3 is the version accepted to SECRYPT 2021

    Journal ref: In Proceedings of the 18th International Conference on Security and Cryptography (2021), ISBN 978-989-758-524-1, ISSN 2184-7711, pages 210-221

  4. arXiv:2005.02061  [pdf, other

    cs.CR

    Privately Connecting Mobility to Infectious Diseases via Applied Cryptography

    Authors: Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch

    Abstract: Recent work has shown that cell phone mobility data has the unique potential to create accurate models for human mobility and consequently the spread of infected diseases. While prior studies have exclusively relied on a mobile network operator's subscribers' aggregated data in modelling disease dynamics, it may be preferable to contemplate aggregated mobility data of infected individuals only. Cl… ▽ More

    Submitted 13 June, 2022; v1 submitted 5 May, 2020; originally announced May 2020.

    Comments: Accepted at PoPETs 2022