Proved generation of implementations from computationally secure protocol specifications
From MaRDI portal
Publication:5326754
Recommendations
Cited in
(8)- scientific article; zbMATH DE number 2090144 (Why is no real title available?)
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Programming Languages and Systems
- Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols
- Formally sound implementations of security protocols with JavaSPI
- G2C: cryptographic protocols from goal-driven specifications
- Verified interoperable implementations of security protocols
- scientific article; zbMATH DE number 1583798 (Why is no real title available?)
This page was built for publication: Proved generation of implementations from computationally secure protocol specifications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5326754)