From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computer-Aided Cryptographic Proofs., , и . SAS, том 7460 из Lecture Notes in Computer Science, стр. 1-2. Springer, (2012)On Strong Normalization of the Calculus of Constructions with Type-Based Termination., и . LPAR (Yogyakarta), том 6397 из Lecture Notes in Computer Science, стр. 333-347. Springer, (2010)A Purely Functional Library for Modular Arithmetic and Its Application to Certifying Large Prime Numbers., и . IJCAR, том 4130 из Lecture Notes in Computer Science, стр. 423-437. Springer, (2006)Symbolic Methods in Computational Cryptography Proofs., , , , и . CSF, стр. 136-151. IEEE, (2019)Security Analysis of ElGamal Implementations., , и . ICETE (2), стр. 310-321. ScitePress, (2020)Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic "Constant-Time"., , и . CSF, стр. 328-343. IEEE Computer Society, (2018)Fully automated analysis of padding-based encryption in the computational model., , , , , , и . ACM Conference on Computer and Communications Security, стр. 1247-1260. ACM, (2013)Mechanized Proofs of Adversarial Complexity and Application to Universal Composability., , , , и . ACM Trans. Priv. Secur., 26 (3): 41:1-41:34 (августа 2023)Certificate translation for optimizing compilers., , , и . ACM Trans. Program. Lang. Syst., 31 (5): 18:1-18:45 (2009)Relational Reasoning via Probabilistic Coupling., , , , , и . LPAR, том 9450 из Lecture Notes in Computer Science, стр. 387-401. Springer, (2015)