EasyCrypt

From MaRDI portal
Software:21717



swMATH9738MaRDI QIDQ21717


No author found.

Source code repository: https://github.com/EasyCrypt/easycrypt




Related Items (32)

MoSS: modular security specifications frameworkAutomated proofs of block cipher modes of operationSecurity Protocol Verification: Symbolic and Computational ModelsVerified Indifferentiable Hashing into Elliptic CurvesBeyond 2-Safety: Asymmetric Product Programs for Relational Program VerificationProbabilistic Relational Hoare Logics for Computer-Aided Security ProofsRelational Reasoning via Probabilistic CouplingComputer-Aided Cryptographic ProofsFormal verification of masked hardware implementations in the presence of glitchesFinding a middle ground for computer-aided cryptographyBeyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic ProgramsCryptHOL: game-based proofs in higher-order logicMonoidal computer. I: Basic computability by string diagramsEmerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years LaterAnother look at automated theorem-proving IIComputer-Aided Verification for Mechanism DesignAuthenticated confidential channel establishment and the security of TLS-DHEPost-quantum verification of Fujisaki-OkamotoVPHL: a verified partial-correctness logic for probabilistic programsProbabilistic Termination by Monadic Affine Sized TypingSystem-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memoryProving uniformity and independence by self-composition and couplingProbabilistic relational verification for cryptographic implementationsTractable Inference Systems: An Extension with a Deducibility PredicateFormalising \(\varSigma\)-protocols and commitment schemes using cryptholComputer-Aided Security Proofs for the Working CryptographerProbabilistic Functions and Cryptographic Oracles in Higher Order LogicBelenios: a simple private and verifiable electronic voting systemImplicit computational complexity of subrecursive definitions and applications to cryptographic proofsFormalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol ModelAutomatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifFormal security proofs with minimal fuss: implicit computational complexity at work


This page was built for software: EasyCrypt