A tutorial-style introduction to \(\mathsf{DY}^{\star}\)
From MaRDI portal
Publication:2154012
DOI10.1007/978-3-030-91631-2_4zbMath1498.94055OpenAlexW3217286445MaRDI QIDQ2154012
Abhishek Bichhawat, Quoc Huy Do, Guido Schmitz, Pedram Hosseyni, Ralf Küsters, Tim Würtele, Karthikeyan Bhargavan
Publication date: 13 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-91631-2_4
Cites Work
- An attack on the Needham-Schroeder public-key authentication protocol
- Authentication tests and the structure of bundles.
- A formal security analysis of the Signal messaging protocol
- Dependent types and multi-monadic effects in F*
- Security Protocol Verification: Symbolic and Computational Models
- On the security of public key protocols
- Using encryption for authentication in large networks of computers
- Modular verification of security protocol code by typing
- Secure distributed programming with value-dependent types
- Advances in Cryptology - CRYPTO 2003
- Computer Aided Verification
This page was built for publication: A tutorial-style introduction to \(\mathsf{DY}^{\star}\)