The following pages link to (Q2763667):
Displaying 6 items.
- A survey of symbolic methods in computational analysis of cryptographic systems (Q540683) (← links)
- Magic-sets for localised analysis of Java bytecode (Q656846) (← links)
- Type systems equivalent to data-flow analyses for imperative languages (Q860844) (← links)
- Cryptographically-masked flows (Q935463) (← links)
- Computationally sound implementations of equational theories against passive adversaries (Q1013091) (← links)
- Unifying simulatability definitions in cryptographic systems under different timing assumptions (Q2484407) (← links)