Cited By
View all- Küsters RTuengerthal M(2011)Ideal key derivation and encryption in simulation-based securityProceedings of the 11th international conference on Topics in cryptology: CT-RSA 201110.5555/1964621.1964639(161-179)Online publication date: 14-Feb-2011
- Cortier VKremer SWarinschi B(2011)A Survey of Symbolic Methods in Computational Analysis of Cryptographic SystemsJournal of Automated Reasoning10.1007/s10817-010-9187-946:3-4(225-259)Online publication date: 1-Apr-2011
- Barthe GGrégoire BZanella Béguelin S(2009)Formal certification of code-based cryptographic proofsACM SIGPLAN Notices10.1145/1594834.148089444:1(90-101)Online publication date: 21-Jan-2009
- Show More Cited By