-
1
-
-
78650000256
-
Computationally sound verification of source code
-
ACM, New York
-
Backes, M., Maffei, M., Unruh, D.: Computationally sound verification of source code. In: 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 387-398. ACM, New York (2010)
-
(2010)
17th ACM Conference on Computer and Communications Security, CCS 2010
, pp. 387-398
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
2
-
-
4944265699
-
Secure information flow by self-composition
-
IEEE Computer Society, Washington
-
Barthe, G., D'Argenio, P., Rezk, T.: Secure information flow by self-composition. In: 17th IEEE Workshop on Computer Security Foundations, CSFW 2004, pp. 100-114. IEEE Computer Society, Washington (2004)
-
(2004)
17th IEEE Workshop on Computer Security Foundations, CSFW 2004
, pp. 100-114
-
-
Barthe, G.1
D'Argenio, P.2
Rezk, T.3
-
3
-
-
78650031443
-
Computational indistinguishability logic
-
ACM, New York
-
Barthe, G., Daubignard, M., Kapron, B., Lakhnech, Y.: Computational indistinguishability logic. In: 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 375-386. ACM, New York (2010)
-
(2010)
17th ACM Conference on Computer and Communications Security, CCS 2010
, pp. 375-386
-
-
Barthe, G.1
Daubignard, M.2
Kapron, B.3
Lakhnech, Y.4
-
4
-
-
67650675340
-
Formal certification of ElGamal encryption. A gentle introduction to CertiCrypt
-
Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. Springer, Heidelberg
-
Barthe, G., Grégoire, B., Heraud, S., Zanella Béguelin, S.: Formal certification of ElGamal encryption. A gentle introduction to CertiCrypt. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 1-19. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5491
, pp. 1-19
-
-
Barthe, G.1
Grégoire, B.2
Heraud, S.3
Zanella Béguelin, S.4
-
5
-
-
79951804314
-
Beyond provable security verifiable IND-CCA security of OAEP
-
Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
-
Barthe, G., Grégoire, B., Lakhnech, Y., Zanella Béguelin, S.: Beyond provable security verifiable IND-CCA security of OAEP. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 180-196. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6558
, pp. 180-196
-
-
Barthe, G.1
Grégoire, B.2
Lakhnech, Y.3
Zanella Béguelin, S.4
-
6
-
-
67649846626
-
Formal certification of code-based cryptographic proofs
-
ACM, New York
-
Barthe, G., Grégoire, B., Zanella Béguelin, S.: Formal certification of code-based cryptographic proofs. In: 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2009, pp. 90-101. ACM, New York (2009)
-
(2009)
36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2009
, pp. 90-101
-
-
Barthe, G.1
Grégoire, B.2
Zanella Béguelin, S.3
-
7
-
-
77957567040
-
A machine-checked formalization of Sigma-protocols
-
IEEE Computer Society, Los Alamitos
-
Barthe, G., Hedin, D., Zanella Béguelin, S., Grégoire, B., Heraud, S.: A machine-checked formalization of Sigma-protocols. In: 23rd IEEE Computer Security Foundations Symposium, CSF 2010, pp. 246-260. IEEE Computer Society, Los Alamitos (2010)
-
(2010)
23rd IEEE Computer Security Foundations Symposium, CSF 2010
, pp. 246-260
-
-
Barthe, G.1
Hedin, D.2
Zanella Béguelin, S.3
Grégoire, B.4
Heraud, S.5
-
8
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
77950909049
-
Modular verification of security protocol code by typing
-
ACM, New York
-
Bhargavan, K., Fournet, C., Gordon, A.D.: Modular verification of security protocol code by typing. In: 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2010, pp. 445-456. ACM, New York (2010)
-
(2010)
37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2010
, pp. 445-456
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
10
-
-
70350687722
-
Computationally sound mechanized proofs for basic and public-key Kerberos
-
ACM, New York
-
Blanchet, B., Jaggard, A.D., Scedrov, A., Tsay, J.K.: Computationally sound mechanized proofs for basic and public-key Kerberos. In: 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 87-99. ACM, New York (2008)
-
(2008)
15th ACM Conference on Computer and Communications Security, CCS 2008
, pp. 87-99
-
-
Blanchet, B.1
Jaggard, A.D.2
Scedrov, A.3
Tsay, J.K.4
-
11
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
IEEE Computer Society, Los Alamitos
-
Blanchet, B.: A computationally sound mechanized prover for security protocols. In: 27th IEEE Symposium on Security and Privacy, S&P 2006, pp. 140-154. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
27th IEEE Symposium on Security and Privacy, S&P 2006
, pp. 140-154
-
-
Blanchet, B.1
-
12
-
-
33749579704
-
Automated security proofs with sequences of games
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Blanchet, B., Pointcheval, D.: Automated security proofs with sequences of games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 537-554. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 537-554
-
-
Blanchet, B.1
Pointcheval, D.2
-
13
-
-
43749110462
-
CC(X): Semantic combination of congruence closure with solvable theories
-
Conchon, S., Contejean, E., Kanig, J., Lescuyer, S.: CC(X): Semantic combination of congruence closure with solvable theories. Electronic Notes in Theoretical Computer Science 198(2), 51-69 (2008)
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.198
, Issue.2
, pp. 51-69
-
-
Conchon, S.1
Contejean, E.2
Kanig, J.3
Lescuyer, S.4
-
14
-
-
48949088211
-
The scyther tool: Verification, falsification, and analysis of security protocols
-
Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
-
Cremers, C.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5123
, pp. 414-418
-
-
Cremers, C.1
-
15
-
-
1442341246
-
-
Tech. Rep. HPL-2003-148, HP Laboratories Palo Alto
-
Detlefs, D., Nelson, G., Saxe, J.B.: Simplify: A theorem prover for program checking. Tech. Rep. HPL-2003-148, HP Laboratories Palo Alto (2003)
-
(2003)
Simplify: A Theorem Prover for Program Checking
-
-
Detlefs, D.1
Nelson, G.2
Saxe, J.B.3
-
17
-
-
33746336609
-
A plausible approach to computer-aided cryptographic proofs
-
EPrint Archive, Report 2005/181
-
Halevi, S.: A plausible approach to computer-aided cryptographic proofs. Cryptology ePrint Archive, Report 2005/181 (2005)
-
(2005)
Cryptology
-
-
Halevi, S.1
-
18
-
-
0005411712
-
Probabilistic extensions of process algebras
-
Bergstra, J., Ponse, A., Smolka, S. (eds.) Elsevier, Amsterdam
-
Jonsson, B., Yi, W., Larsen, K.G.: Probabilistic extensions of process algebras. In: Bergstra, J., Ponse, A., Smolka, S. (eds.) Handbook of Process Algebra, pp. 685-710. Elsevier, Amsterdam (2001)
-
(2001)
Handbook of Process Algebra
, pp. 685-710
-
-
Jonsson, B.1
Yi, W.2
Larsen, K.G.3
-
19
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. J. of Comput. Secur. 6(1-2), 85-128 (1998)
-
(1998)
J. of Comput. Secur.
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
20
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
ePrint Archive, Report 2004/332
-
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004)
-
(2004)
Cryptology
-
-
Shoup, V.1
-
21
-
-
58149385191
-
Proof checking technology for satisfiability modulo theories
-
Stump, A.: Proof checking technology for satisfiability modulo theories. Electr. Notes Theor. Comput. Sci. 228, 121-133 (2009)
-
(2009)
Electr. Notes Theor. Comput. Sci.
, vol.228
, pp. 121-133
-
-
Stump, A.1
-
22
-
-
57049139521
-
-
The Coq development team Version 8.3
-
The Coq development team: The Coq Proof Assistant Reference Manual Version 8.3 (2010), http://coq.inria.fr
-
(2010)
The Coq Proof Assistant Reference Manual
-
-
-
24
-
-
70449646572
-
Formally certifying the security of digital signature schemes
-
IEEE Computer Society, Los Alamitos
-
Zanella Béguelin, S., Grégoire, B., Barthe, G., Olmedo, F.: Formally certifying the security of digital signature schemes. In: 30th IEEE Symposium on Security and Privacy, S&P 2009, pp. 237-250. IEEE Computer Society, Los Alamitos (2009)
-
(2009)
30th IEEE Symposium on Security and Privacy, S&P 2009
, pp. 237-250
-
-
Zanella Béguelin, S.1
Grégoire, B.2
Barthe, G.3
Olmedo, F.4
|