Cited By
View all- K. KRebeiro CHazra A(2018)An Algorithmic Approach to Formally Verify an ECC LibraryACM Transactions on Design Automation of Electronic Systems10.1145/322420523:5(1-26)Online publication date: 25-Aug-2018
- Debbabi MMejri M(2013)Towards the Correctness of Security ProtocolsElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/S1571-0661(03)50004-483(55-98)Online publication date: 1-Jan-2013
- Liu ZLynch C(2011)Efficient general unification for XOR with homomorphismProceedings of the 23rd international conference on Automated deduction10.5555/2032266.2032297(407-421)Online publication date: 31-Jul-2011
- Show More Cited By