共 41 条
[22]
Implementing TLS with Verified Cryptographic Security
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:445-459
[24]
Cadé D, 2013, LECT NOTES COMPUT SC, V7796, P63, DOI 10.1007/978-3-642-36830-1_4
[25]
Verifying Curve25519 Software
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:299-309
[26]
Erkok Levent, 2009, Proceedings of the 2009 9th International Conference Formal Methods in Computer-Aided Design (FMCAD), P188, DOI 10.1109/FMCAD.2009.5351121
[28]
Gu L., 2011, P 2 AS PAC WORKSH SY, P3
[29]
HALEVI S, 2005, PLAUSIBLE APPROACH C