Amanote Research

Amanote Research

    RegisterSign In

Computer-Aided Security Proofs for the Working Cryptographer

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-22792-9_5
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2011

Authors
Gilles BartheBenjamin GrégoireSylvain HeraudSantiago Zanella Béguelin
Publisher

Springer Berlin Heidelberg


Related search

Computer-Aided Cryptographic Proofs

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Computer-Aided Design and Computer-Aided Engineering

MATEC Web of Conferences
Materials ScienceEngineeringChemistry
2018English

On Tight Security Proofs for Schnorr Signatures

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Interpreting Hash Function Security Proofs

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Modular Security Proofs for Key Agreement Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Standards for Computer Aided Manufacturing

1977English

Computer Aided Verification

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Computer Aided Verification

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2017English

Computer Aided Verification

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1997English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy