共 23 条
[1]
Machine-Checked Proofs for Cryptographic Standards Indifferentiability of SPONGE and Secure High-Assurance Implementations of SHA-3
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:1607-1622
[2]
EasyPQC: Verifying Post-Quantum Cryptography
[J].
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:2564-2586
[3]
SoK: Computer-Aided Cryptography
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:777-795
[4]
Barthe Gilles, 2012, Interactive Theorem Proving. Proceedings of the Third International Conference, ITP 2012, P11, DOI 10.1007/978-3-642-32347-8_2
[5]
Barthe G, 2011, LECT NOTES COMPUT SC, V6558, P180, DOI 10.1007/978-3-642-19074-2_13
[6]
The SPHINCS+ Signature Framework
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:2129-2146
[7]
Bos JW, 2020, IACR Transactions on Cryptographic Hardware and Embedded Systems, P137, DOI [10.46586/tches.v2021.i1.137-168, 10.46586/tches.v2021.i1.137-168, DOI 10.46586/TCHES.V2021.I1.137-168]
[8]
Cooper D. A., 2020, Recommendation for stateful hashbased signature schemes, 2020-10-29 00:10:00 2020, V800-208
[9]
A Comprehensive Symbolic Analysis of TLS 1.3
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1773-1788
[10]
Tight Adaptive Reprogramming in the QROM
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I,
2021, 13090
:637-667