Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Kim Pecina
G2C: Cryptographic Protocols From Goal-Driven Specifications
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Cryptographic Protocols From Lattices
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Programming Cryptographic Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Multi-Exponentiation (Cryptographic Protocols)
IEE Proceedings - Computers and Digital Techniques
Cryptographic Protocols for Electronic Voting
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
First-Order Verification of Cryptographic Protocols
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Unsupervised Learning From a Goal-Driven Agent.
Resource Fairness and Composability of Cryptographic Protocols
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
Resource Fairness and Composability of Cryptographic Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Equivalence Properties by Typing in Cryptographic Branching Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science