Proved Generation of Implementations from Computationally Secure Protocol Specifications
From MaRDI portal
Publication:5326754
DOI10.1007/978-3-642-36830-1_4zbMath1390.68274OpenAlexW2145835327MaRDI QIDQ5326754
Publication date: 6 August 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36830-1_4
Related Items
Formally sound implementations of security protocols with JavaSPI ⋮ System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
Uses Software