Recommendations
Cites work
- scientific article; zbMATH DE number 1617925 (Why is no real title available?)
- scientific article; zbMATH DE number 176566 (Why is no real title available?)
- scientific article; zbMATH DE number 1302836 (Why is no real title available?)
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 1950340 (Why is no real title available?)
- scientific article; zbMATH DE number 1440054 (Why is no real title available?)
- A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs
- Automated Reasoning
- Automated Security Proofs with Sequences of Games
- Formal certification of code-based cryptographic proofs
- New directions in cryptography
- OAEP reconsidered
- Types for Proofs and Programs
- Zero-knowledge proofs of identity
Cited in
(8)- A Calculus for Game-Based Security Proofs
- Automating Computational Proofs for Public-Key-Based Key Exchange
- Beyond provable security verifiable IND-CCA security of OAEP
- Automated proofs for asymmetric encryption
- Automated proofs of block cipher modes of operation
- Automated verification of block cipher modes of operation, an improved method
- Automated security proof for symmetric encryption modes
- Automated Security Proofs with Sequences of Games
This page was built for publication: Automated proofs for asymmetric encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q540682)