Modular code-based cryptographic verification
- 17 October 2011
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 341-350
- https://doi.org/10.1145/2046707.2046746
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition ParadigmJournal of Cryptology, 2008
- The reactive simulatability (RSIM) framework for asynchronous systemsInformation and Computation, 2007
- Conditional reactive simulatabilityInternational Journal of Information Security, 2007
- Protocol Composition Logic (PCL)Electronic Notes in Theoretical Computer Science, 2007
- Cryptographic Protocol Analysis on Real C CodePublished by Springer Nature ,2005
- Analyzing security protocols with secrecy types and logic programsJournal of the ACM, 2005
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- A new Characterization of Type-2 FeasibilitySIAM Journal on Computing, 1996
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Protection in programming languagesCommunications of the ACM, 1973