共 19 条
[1]
The Last Mile: High-Assurance and High-Speed Cryptographic Implementations
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:965-982
[2]
Banerjee A, 2012, LECT NOTES COMPUT SC, V7237, P719, DOI 10.1007/978-3-642-29011-4_42
[3]
Barbosa M., 2021, 20211253 CRYPT EPRIN
[4]
SoK: Computer-Aided Cryptography
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:777-795
[5]
Barthe Gilles, 2012, Interactive Theorem Proving. Proceedings of the Third International Conference, ITP 2012, P11, DOI 10.1007/978-3-642-32347-8_2
[6]
Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409
[7]
Random Oracles in a Quantum World
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011,
2011, 7073
:41-+
[8]
A Comprehensive Symbolic Analysis of TLS 1.3
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1773-1788
[9]
D'Anvers Jan-Pieter, 2018, Progress in Cryptology - AFRICACRYPT 2018. 10th International Conference on Cryptology in Africa. Proceedings: LNCS 10831, P282, DOI 10.1007/978-3-319-89339-6_16
[10]
DAnvers J.-P., 2021, THESIS KU LEUVEN