Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899288
DOI10.1007/11734727zbMath1185.94061OpenAlexW2493058093MaRDI QIDQ5899288
No author found.
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11734727
Related Items (7)
Information-flow control on ARM and POWER multicore processors ⋮ Certified compilation for cryptography: extended x86 instructions and constant-time verification ⋮ Unnamed Item ⋮ Output-sensitive information flow analysis ⋮ Formal verification of side-channel countermeasures using self-composition ⋮ System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory ⋮ Graded Hoare logic and its categorical semantics
This page was built for publication: Information Security and Cryptology - ICISC 2005