Computer-Aided Security Proofs for the Working Cryptographer
Top Cited Papers
- 1 January 2011
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Beyond Provable Security Verifiable IND-CCA Security of OAEPPublished by Springer Nature ,2011
- A Machine-Checked Formalization of Sigma-ProtocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Formal Certification of ElGamal EncryptionPublished by Springer Nature ,2009
- The Scyther Tool: Verification, Falsification, and Analysis of Security ProtocolsPublished by Springer Nature ,2008
- CC(X): Semantic Combination of Congruence Closure with Solvable TheoriesElectronic Notes in Theoretical Computer Science, 2008
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing ProofsPublished by Springer Nature ,2006
- Automated Security Proofs with Sequences of GamesPublished by Springer Nature ,2006
- Secure information flow by self-compositionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Probabilistic Extensions of Process Algebras**This chapter is dedicated to the fond memory of Linda Christoff.Published by Elsevier ,2001
- The inductive approach to verifying cryptographic protocolsJournal of Computer Security, 1998