Machine-Checked Security Proofs of Cryptographic Signature Schemes
From MaRDI portal
Publication:5862663
DOI10.1007/11555827_9zbMath1487.94159OpenAlexW1606603814MaRDI QIDQ5862663
Publication date: 9 March 2022
Published in: Computer Security – ESORICS 2005 (Search for Journal in Brave)
Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.8259
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Formalization of mathematics in connection with theorem provers (68V20)
Uses Software
Cites Work
- Complexity of a determinate algorithm for the discrete logarithm
- Logics for reasoning about cryptographic constructions
- Generic groups, collision resistance, and ECDSA
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- New directions in cryptography
- The Exact Security of ECIES in the Generic Group Model
- A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols
- Symmetric Authentication within a Simulatable Cryptographic Library
- Automated Reasoning
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Machine-Checked Security Proofs of Cryptographic Signature Schemes