1. Probabilistic relational verification for cryptographic implementations;Barthe,2014
2. Refinement types for secure implementations;Bengtson;ACM Trans. Program. Lang. Syst.,2011
3. Towards an automated tupling strategy;Chin,1993
4. Semantics of Programming Languages: Structures and Techniques;Gunter,1992
5. Game-theoretic analysis of call-by-value computation;Honda;Theor. Comput. Sci.,1999