Cited in
(65)- Verified indifferentiable hashing into elliptic curves
- RHLE Benchmarks
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Probabilistic termination by monadic affine sized typing
- Finding a middle ground for computer-aided cryptography
- Belenios
- Monoidal computer. I: Basic computability by string diagrams
- Automated proofs of block cipher modes of operation
- Jasmin
- Computer-aided verification for mechanism design
- Formalising \(\varSigma\)-protocols and commitment schemes using crypthol
- VPHL: a verified partial-correctness logic for probabilistic programs
- Relational reasoning via probabilistic coupling
- Tractable inference systems: an extension with a deducibility predicate
- Probabilistic relational Hoare logics for computer-aided security proofs
- Computer-aided cryptographic proofs
- Belenios: a simple private and verifiable electronic voting system
- COSTA
- TulaFale
- AVISPA
- Probabilistic functions and cryptographic oracles in higher order logic
- CertiCrypt
- scyther
- ASPIER
- Spi2Java
- GNUC
- pGCL
- Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later
- Security protocol verification: symbolic and computational models
- Probabilistic relational verification for cryptographic implementations
- Plutus
- CoSP
- ALEA
- F*
- CryptHOL: game-based proofs in higher-order logic
- CryptHOL
- LLL Factorization
- Zoo Probabilistic Systems
- acrt
- REBECCA
- CacheAudit
- Yosys
- Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs
- Formal verification of masked hardware implementations in the presence of glitches
- Formal security proofs with minimal fuss: implicit computational complexity at work
- Helios
- HACL*
- Game_Based_Crypto
- MFMC_Countable
- Probabilistic_While
- Automatic verification of security protocols in the symbolic model: the verifier ProVerif
- Formalization in PVS of balancing properties necessary for proving security of the Dolev-Yao cascade protocol model
- MoSS: modular security specifications framework
- AMulet
- EasyUC
- G6K
- Q#
- Beyond 2-safety: asymmetric product programs for relational program verification
- Authenticated confidential channel establishment and the security of TLS-DHE
- Implicit computational complexity of subrecursive definitions and applications to cryptographic proofs
- MoSS
- Computer-Aided Security Proofs for the Working Cryptographer
- Post-quantum verification of Fujisaki-Okamoto
- Proving uniformity and independence by self-composition and coupling
- Another look at automated theorem-proving. II
This page was built for software: EasyCrypt