×

Found 23 Documents (Results 1–23)

A formal library for elliptic curves in the Coq proof assistant. (English) Zbl 1416.68150

Klein, Gerwin (ed.) et al., Interactive theorem proving. 5th international conference, ITP 2014, held as part of the Vienna summer of logic, VSL 2014, Vienna, Austria, July 14–17, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8558, 77-92 (2014).
MSC:  68T15 14H52 94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Probabilistic relational verification for cryptographic implementations. (English) Zbl 1284.68380

Proceedings of the 41st ACM SIGPLAN-SIGACT symposium on principles of programming languages, POPL ’14, San Diego, CA, USA, January 22–24, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2544-8). 193-205 (2014).
MSC:  68Q60 03B70 68N18 68T15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Probabilistic relational reasoning for differential privacy. (English) Zbl 1321.68182

Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on principles of programming languages, POPL ’12, Philadelphia, PA, USA, January 22–28, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1083-3). 97-110 (2012).
MSC:  68N30 94A60 68T15 68W20 68W27
PDFBibTeX XMLCite
Full Text: DOI

Formalization of Shannon’s theorems in SSReflect-Coq. (English) Zbl 1314.68270

Beringer, Lennart (ed.) et al., Interactive theorem proving. Third international conference, ITP 2012, Princeton, NJ, USA, August 13–15, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32346-1/pbk). Lecture Notes in Computer Science 7406, 233-249 (2012).
MSC:  68T15 94A17 94A24
PDFBibTeX XMLCite
Full Text: DOI

A certificate infrastructure for machine-checked proofs of conditional information flow. (English) Zbl 1353.68046

Degano, Pierpaolo (ed.) et al., Principles of security and trust. First international conference, POST 2012, held as part of the European joint conferences on theory and practice of software, ETAPS 2012, Tallinn, Estonia, March 24 – April 1, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28640-7/pbk). Lecture Notes in Computer Science 7215, 369-389 (2012).
MSC:  68N30 68N15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical realisation and elimination of an ECC-related software bug attack. (English) Zbl 1292.94040

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 171-186 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

SC\(^{2}\): Secure communication over smart cards. How to secure off-card matching in security-by-contract for open multi-application smart cards. (English) Zbl 1302.94044

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 32-48 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Certified security proofs of cryptographic protocols in the computational model: an application to intrusion resilience. (English) Zbl 1350.68229

Jouannaud, Jean-Pierre (ed.) et al., Certified programs and proofs. First international conference, CPP 2011, Kenting, Taiwan, December 7–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25378-2/pbk). Lecture Notes in Computer Science 7086, 378-393 (2011).
MSC:  68T15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Verifiable security of Boneh-Franklin identity-based encryption. (English) Zbl 1298.94079

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 68-83 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A formalization of polytime functions. (English) Zbl 1342.68286

Van Eekelen, Marko (ed.) et al., Interactive theorem proving. Second international conference, ITP 2011, Berg en Dal, The Netherlands, August 22–25, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22862-9/pbk). Lecture Notes in Computer Science 6898, 119-134 (2011).
MSC:  68T15 68Q25 94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Beyond provable security verifiable IND-CCA security of OAEP. (English) Zbl 1284.94052

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 180-196 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Programming language techniques for cryptographic proofs. (English) Zbl 1291.68323

Kaufmann, Matt (ed.) et al., Interactive theorem proving. First international conference, ITP 2010, Edinburgh, UK, July 11–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14051-8/pbk). Lecture Notes in Computer Science 6172, 115-130 (2010).
MSC:  68T15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Formal certification of code-based cryptographic proofs. (English) Zbl 1315.68081

Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on principles of programming languages, POPL ’09, Savannah, GA, USA, January 18–24, 2009. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-379-2). 90-101 (2009).
MSC:  68N30 03B70 68T15 94A60
PDFBibTeX XMLCite
Full Text: DOI

A formal language for cryptographic pseudocode. (English) Zbl 1182.94035

Cervesato, Iliano (ed.) et al., Logic for programming, artificial intelligence, and reasoning. 15th international conference, LPAR 2008, Doha, Qatar, November 22–27, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89438-4/pbk). Lecture Notes in Computer Science 5330. Lecture Notes in Artificial Intelligence, 353-376 (2008).
MSC:  94A60 68N18 68T15
PDFBibTeX XMLCite
Full Text: DOI

Cryptographic protocol explication and end-point projection. (English) Zbl 1481.94117

Jajodia, Sushil (ed.) et al., Computer security – ESORICS 2008. 13th European symposium on research in computer security, Málaga, Spain, October 6–8, 2008. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 5283, 533-547 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Formal proof of provable security by game-playing in a proof assistant. (English) Zbl 1138.94345

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 151-168 (2007).
MSC:  94A60 94A62 68T15
PDFBibTeX XMLCite
Full Text: DOI

A machine-checked formalization of the random oracle model. (English) Zbl 1172.94560

Filliâtre, Jean-Christophe (ed.) et al., Types for proofs and programs. International workshop, TYPES 2004, Jouy-en-Josas, France, December 15–18, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-31428-8/pbk). Lecture Notes in Computer Science 3839, 33-49 (2006).
MSC:  94A60 68T15
PDFBibTeX XMLCite
Full Text: DOI

Machine-checked security proofs of cryptographic signature schemes. (English) Zbl 1487.94159

de Capitani di Vimercati, Sabrina (ed.) et al., Computer security – ESORICS 2005. 10th European symposium on research in computer security, Milan, Italy, September 12–14, 2005. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 3679, 140-158 (2005).
MSC:  94A62 68V20 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A machine-checked formalization of the generic model and the random oracle model. (English) Zbl 1126.68558

Basin, David (ed.) et al., Automated reasoning. Second international joint conference, IJCAR 2004, Cork, Ireland, July 4–8, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22345-2/pbk). Lecture Notes in Computer Science 3097. Lecture Notes in Artificial Intelligence, 385-399 (2004).
MSC:  68T15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software