Cited By
View all- Bailey BMiller ABalzarotti DXu W(2024)Formalizing soundness proofs of linear PCP SNARKsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698984(1489-1506)Online publication date: 14-Aug-2024
- Xie XLi YZhang WWang TXu SZhu JSong Y(2024)GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00131(484-502)Online publication date: 19-May-2024
- Dittmer SEldefrawy KGraham-Lengrand SLu SOstrovsky RPereira VMeng WJensen CCremers CKirda E(2023)Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-KnowledgeProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616583(2098-2112)Online publication date: 15-Nov-2023
- Show More Cited By