共 50 条
- [2] Verification of Implementations of Cryptographic Hash Functions IEEE ACCESS, 2017, 5 : 7816 - 7825
- [4] Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly 2021 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2021), 2021, : 94 - 102
- [5] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project Electron. Notes Theor. Comput. Sci., 1 (123-136):
- [7] Rewriting for cryptographic protocol verification AUTOMATED DEDUCTION - CADE-17, 2000, 1831 : 271 - 290
- [8] Automated verification tools for cryptographic protocols 2021 INTERNATIONAL CONFERENCE ON PROMISING ELECTRONIC TECHNOLOGIES (ICPET 2021), 2021, : 58 - 65
- [10] Identifying and testing for insecure paths in cryptographic protocol implementations 30th Annual International Computer Software and Applications Conference, Vol 2, Short Papers/Workshops/Fast Abstracts/Doctoral Symposium, Proceedings, 2006, : 368 - 369