Cited By
View all- Xie XLi YZhang WWang TXu SZhu JSong Y(2024)GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00131(484-502)Online publication date: 19-May-2024
- Blanchet B(2024)Dealing with Dynamic Key Compromise in Crypto Verif2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00015(495-510)Online publication date: 8-Jul-2024
- Kosaian KTan YRozier K(2024)Formalizing Coppersmith’s Method in Isabelle/HOLIntelligent Computer Mathematics10.1007/978-3-031-66997-2_8(127-145)Online publication date: 5-Aug-2024
- Show More Cited By