Computer-Aided Security Proofs for the Working Cryptographer

From MaRDI portal
Publication:5199185

DOI10.1007/978-3-642-22792-9_5zbMath1287.94048OpenAlexW2123991163MaRDI QIDQ5199185

Sylvain Heraud, Gilles Barthe, Santiago Zanella Béguelin, Benjamin Grégoire

Publication date: 12 August 2011

Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_5




Related Items (22)

MoSS: modular security specifications frameworkAutomated proofs of block cipher modes of operationShort variable length domain extenders with beyond birthday bound securityCryptHOL: game-based proofs in higher-order logicMonoidal computer. I: Basic computability by string diagramsEmerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years LaterHow to simulate it in Isabelle: towards formal proof for secure multi-party computationComputer-Aided Verification for Mechanism DesignAuthenticated confidential channel establishment and the security of TLS-DHEPost-quantum verification of Fujisaki-OkamotoState separation for code-based game-playing proofsVPHL: a verified partial-correctness logic for probabilistic programsProbabilistic Termination by Monadic Affine Sized TypingSystem-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memoryVerifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBCFormalising \(\varSigma\)-protocols and commitment schemes using cryptholProbabilistic Functions and Cryptographic Oracles in Higher Order LogicImplicit computational complexity of subrecursive definitions and applications to cryptographic proofsFormalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol ModelAutomatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifEasyCrypt: A TutorialFormal security proofs with minimal fuss: implicit computational complexity at work


Uses Software



This page was built for publication: Computer-Aided Security Proofs for the Working Cryptographer