From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fully automated analysis of padding-based encryption in the computational model., , , , , , и . ACM Conference on Computer and Communications Security, стр. 1247-1260. ACM, (2013)Security Analysis of ElGamal Implementations., , и . ICETE (2), стр. 310-321. ScitePress, (2020)Mechanized Proofs of Adversarial Complexity and Application to Universal Composability., , , , и . ACM Trans. Priv. Secur., 26 (3): 41:1-41:34 (августа 2023)A Purely Functional Library for Modular Arithmetic and Its Application to Certifying Large Prime Numbers., и . IJCAR, том 4130 из Lecture Notes in Computer Science, стр. 423-437. Springer, (2006)On Strong Normalization of the Calculus of Constructions with Type-Based Termination., и . LPAR (Yogyakarta), том 6397 из Lecture Notes in Computer Science, стр. 333-347. Springer, (2010)Symbolic Methods in Computational Cryptography Proofs., , , , и . CSF, стр. 136-151. IEEE, (2019)Computer-Aided Cryptographic Proofs., , и . SAS, том 7460 из Lecture Notes in Computer Science, стр. 1-2. Springer, (2012)Certificate translation for optimizing compilers., , , и . ACM Trans. Program. Lang. Syst., 31 (5): 18:1-18:45 (2009)Mechanized Proofs of Adversarial Complexity and Application to Universal Composability., , , , и . CCS, стр. 2541-2563. ACM, (2021)Proving uniformity and independence by self-composition and coupling., , , , и . LPAR, том 46 из EPiC Series in Computing, стр. 385-403. EasyChair, (2017)