-
2
-
-
26444497860
-
The Avispa tool for the automated validation of internet security protocols and applications
-
Proceedings of Computer Aided Verification (CAV)
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.C. He, M. Rusinowitch, J. Santiago, M. Turuani, L. Vigano, and L. Vigneron, The Avispa tool for the automated validation of internet security protocols and applications, Proceedings of Computer Aided Verification (CAV), Springer LNCS, no. 3576, 2005.
-
(2005)
Springer LNCS
, Issue.3576
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
He, P.C.8
Rusinowitch, M.9
Santiago, J.10
Turuani, M.11
Vigano, L.12
Vigneron, L.13
-
3
-
-
19744374538
-
Symmetric authentication in a simulatable Dolev- Yao style cryptographic library
-
Michael Backes, Birgit Pfitzmann, and Michael Waidner, Symmetric authentication in a simulatable Dolev- Yao style cryptographic library, Journal of Information Security 4 (2005), no. 3, 135-154.
-
(2005)
Journal of Information Security
, vol.4
, Issue.3
, pp. 135-154
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
4
-
-
0346494239
-
-
September
-
C. Burwick, D. Coppersmith, E. D'Avignon, R. Gennaro, S. Halevi, C. Jutla, S. Mathas Jr., L. O'Connor, M. Peyravian, D. Safford, and N. Zunic, MARS-a candidate cipher for AES, Available at http://www.research.ibm.com/ security/mars.pdf, September 1999.
-
(1999)
MARS-a Candidate Cipher for AES
-
-
Burwick, C.1
Coppersmith, D.2
D'Avignon, E.3
Gennaro, R.4
Halevi, S.5
Jutla, C.6
Mathas Jr., S.7
O'Connor, L.8
Peyravian, M.9
Safford, D.10
Zunic, N.11
-
5
-
-
33745451168
-
The design of Rijndael: AES - The advanced encryption standard
-
Springer-Verlag
-
Joan Daemen and Vincent Rijmen, The design of Rijndael: AES - the Advanced Encryption Standard, Information Security and Cryptography, no. 17, Springer-Verlag, 2002.
-
(2002)
Information Security and Cryptography
, Issue.17
-
-
Daemen, J.1
Rijmen, V.2
-
6
-
-
0012983374
-
Recommendation for block cipher modes of operation: Methods and techniques
-
National Institute of Standards and Technology
-
Morris Dworkin, Recommendation for block cipher modes of operation: Methods and techniques, Tech. Report SP 800-38A, National Institute of Standards and Technology, 2001.
-
(2001)
Tech. Report
, vol.SP 800-38A
-
-
Dworkin, M.1
-
7
-
-
35148884608
-
Automatic formal synthesis of hardware from higher order logic
-
ENTCS, to appear
-
M. Gordon, J. Iyoda, S. Owens, and K. Slind, Automatic formal synthesis of hardware from higher order logic, Proceedings of Fifth International Workshop on Automated Verification of Critical Systems (AVoCS), ENTCS, 2005, to appear.
-
(2005)
Proceedings of Fifth International Workshop on Automated Verification of Critical Systems (AVoCS)
-
-
Gordon, M.1
Iyoda, J.2
Owens, S.3
Slind, K.4
-
8
-
-
85028910917
-
Markov ciphers and differential cryptanalysis
-
Advances in Cryptology - Eurocrypt '91 (Donald W. Davies, ed.), Springer Verlag
-
X. Lai, J.L. Massey, and S. Murphy, Markov ciphers and differential cryptanalysis, Advances in Cryptology - Eurocrypt '91 (Donald W. Davies, ed.), LNCS, vol. 547, Springer Verlag, 1991, pp. 17-38.
-
(1991)
LNCS
, vol.547
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
Murphy, S.3
-
9
-
-
84858920115
-
Cryptol, a domain specific language for cryptography
-
Galois Connections Inc.
-
Jeff Lewis, Cryptol, a domain specific language for cryptography, Tech. report, Galois Connections Inc., 2002, URL-http://www.cryptol.net/docs/ CryptolPaper.pdf.
-
(2002)
Tech. Report
-
-
Lewis, J.1
-
10
-
-
23944459288
-
Recursive definition over coinductive types
-
Proceedings of the 12th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'99) (Nice) (Y. Bertot, G. Dowek, A. Hirschowitz, G. Paulin, and L. Thery, eds.), Springer-Verlag
-
John Matthews, Recursive definition over coinductive types, Proceedings of the 12th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'99) (Nice) (Y. Bertot, G. Dowek, A. Hirschowitz, G. Paulin, and L. Thery, eds.), LNCS, no. 1690, Springer-Verlag, 1999.
-
(1999)
LNCS
, Issue.1690
-
-
Matthews, J.1
-
11
-
-
84957703507
-
Calculate polytypicallyl
-
(H. Kuchen and S.D. Swiestra, eds.), Springer-Verlag, Berlin
-
Lambert Meertens, Calculate polytypicallyl, Proc. 8th Int. Symp. on Programming Languages: Implementations, Logics, and Programs, PLILP'96 (H. Kuchen and S.D. Swiestra, eds.), vol. 1140, Springer-Verlag, Berlin, 1996, pp. 1-16.
-
(1996)
Proc. 8th Int. Symp. on Programming Languages: Implementations, Logics, and Programs, PLILP'96
, vol.1140
, pp. 1-16
-
-
Meertens, L.1
-
13
-
-
0003508558
-
-
United States National Institute of Standards and Technology, Advanced Encryption Standard, Web: http://csrc.nist.gov/encryption/aes/, 2001.
-
(2001)
Advanced Encryption Standard
-
-
-
14
-
-
0037565669
-
Proof checking the RSA public key encryption algorithm
-
R.Boyer and J Moore, Proof checking the RSA public key encryption algorithm, American Mathematical Monthly 91 (1984), no. 3, 181-189.
-
(1984)
American Mathematical Monthly
, vol.91
, Issue.3
, pp. 181-189
-
-
Boyer, R.1
Moore, J.2
-
15
-
-
0004102023
-
-
August
-
R. Rivest, M. Robshae, R. Sidney, and Y.L. Yin, The RC6 block cipher, Available at http://www.rsasecurity.com/rsalabs/rc6, August 1998.
-
(1998)
The RC6 Block Cipher
-
-
Rivest, R.1
Robshae, M.2
Sidney, R.3
Yin, Y.L.4
-
16
-
-
0006686739
-
-
John Wiley and Sons
-
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, The Twofish encryption algorithm, John Wiley and Sons, 2003.
-
(2003)
The Twofish Encryption Algorithm
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
-
17
-
-
33745457231
-
A verification of Rijndael in HOL
-
Supplementary Proceedings of TPHOLs 2002 (V. A Carreno, C. A. Munoz, and S. Tahar, eds.), no. CP-2002-211736, August
-
Konrad Slind, A verification of Rijndael in HOL, Supplementary Proceedings of TPHOLs 2002 (V. A Carreno, C. A. Munoz, and S. Tahar, eds.), NASA Conference Proceedings, no. CP-2002-211736, August 2002.
-
(2002)
NASA Conference Proceedings
-
-
Slind, K.1
-
18
-
-
21144455772
-
Applications of polytypism in theorem proving
-
Theorem Proving in Higher Order Logics, 16th International Conference, TPHOLs 2003, Rome, Italy, Proceedings (D. Basin and B. Wolff, eds.), Springer, September
-
Konrad Slind and Joe Kurd, Applications of polytypism in theorem proving, Theorem Proving in Higher Order Logics, 16th International Conference, TPHOLs 2003, Rome, Italy, Proceedings (D. Basin and B. Wolff, eds.), Lecture Notes in Computer Science, vol. 2758, Springer, September 2003, pp. 103-119.
-
(2003)
Lecture Notes in Computer Science
, vol.2758
, pp. 103-119
-
-
Slind, K.1
Kurd, J.2
-
19
-
-
33745477000
-
Formalizing Huffman's algorithm
-
Department of Informatics, University of Acquila
-
Laurent Thery, Formalizing Huffman's algorithm, Tech. Report TRCS 034/2004, Department of Informatics, University of Acquila, 2004.
-
(2004)
Tech. Report
, vol.TRCS 034-2004
-
-
Thery, L.1
-
20
-
-
26844556563
-
Formal verification of a SHA-1 circuit core using ACL2
-
Theorem Proving in Higher Order Logics, 18th International Conference, TPHOLs'05 (Joe Kurd and Tom Melham, eds.), Springer-Verlag, August
-
Diana Toma and Dominique Borrione, Formal verification of a SHA-1 circuit core using ACL2, Theorem Proving in Higher Order Logics, 18th International Conference, TPHOLs'05 (Joe Kurd and Tom Melham, eds.), Lecture Notes in Computer Science, vol. 3603, Springer-Verlag, August 2005, pp. 326-341.
-
(2005)
Lecture Notes in Computer Science
, vol.3603
, pp. 326-341
-
-
Toma, D.1
Borrione, D.2
-
21
-
-
0346477056
-
Monads for functional programming
-
Marktoberdorf Summer School on Progam Design Calculi (M. Broy, ed.), Springer-Verlag
-
Phil Wadler, Monads for functional programming, Marktoberdorf Summer School on Progam Design Calculi (M. Broy, ed.), NATO ASI Series F: Computer and Systems Sciences, vol. 118, Springer-Verlag, 1992.
-
(1992)
NATO ASI Series F: Computer and Systems Sciences
, vol.118
-
-
Wadler, P.1
-
22
-
-
84869815133
-
TEA, a tiny encryption algorithm
-
Fast Software Encryption: Second International Workshop, Springer Verlag
-
David Wheeler and Roger Needham, TEA, a tiny encryption algorithm, Fast Software Encryption: Second International Workshop, Lecture Notes in Computer Science, vol. 1008, Springer Verlag, 1999, pp. 363-366.
-
(1999)
Lecture Notes in Computer Science
, vol.1008
, pp. 363-366
-
-
Wheeler, D.1
Needham, R.2
|