Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Barbosa M, Barthe G, Fan X, Grégoire B, Hung SH, Katz J, Strub PY, Wu X, Zhou L (2021a) EasyPQC: verifying post-quantum cryptography. In: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security, pp 2564–2586
2. Barbosa M, Barthe G, Bhargavan K, Blanchet B, Cremers C, Liao K, Parno B (2021b) SoK: computer-aided cryptography. In: 42nd IEEE symposium on security and privacy, pp 777–795
3. Barthe G, Crespo JM, Grégoire B, Kunz C, Lakhnech Y, Schmidt B, Zanella-Béguelin S (2013, November) Fully automated analysis of padding-based encryption in the computational model. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp 1247–1260
4. Barthe G, Dupressoir F, Grégoire B, Kunz C, Schmidt B, Strub P (2014) Easycrypt: a tutorial. Foundations of security analysis and design VII: FOSAD 2012/2013 tutorial lectures, pp 146–166
5. Bellare M, Rogaway P (2004). The security of triple encryption and a framework for code-based game-playing proofs. Cryptology ePrint Archive, Paper 2004/331. http://eprint.iacr.org/2004/331