Automated Verification of Real-World Cryptographic Implementations
暂无分享,去创建一个
[1] Marian Srebrny,et al. Security margin evaluation of SHA-3 contest finalists through SAT-based attacks , 2012, IACR Cryptol. ePrint Arch..
[2] Konrad Slind,et al. Decompilation into logic — Improved , 2012, 2012 Formal Methods in Computer-Aided Design (FMCAD).
[3] Tao Huang,et al. Differential Attacks against Stream Cipher ZUC , 2012, ASIACRYPT.
[4] Peter Schwabe,et al. Verifying Curve25519 Software , 2014, CCS.
[5] Vladimir Klebanov,et al. Pseudo-Random Number Generator Verification: A Case Study , 2015, VSTTE.
[6] Robert K. Brayton,et al. ABC: An Academic Industrial-Strength Verification Tool , 2010, CAV.
[7] Ilya Mironov,et al. Applications of SAT Solvers to Cryptanalysis of Hash Functions , 2006, SAT.
[8] John Matthews,et al. Pragmatic equivalence and safety checking in Cryptol , 2009, PLPV '09.
[9] Frederik Vercauteren,et al. Practical Realisation and Elimination of an ECC-Related Software Bug Attack , 2012, CT-RSA.
[10] Andrew W. Appel,et al. Verification of a Cryptographic Primitive: SHA-256 , 2015, TOPL.
[11] Benjamin Grégoire,et al. Computer-Aided Security Proofs for the Working Cryptographer , 2011, CRYPTO.
[12] Peter Schachte,et al. State Joining and Splitting for the Symbolic Execution of Binaries , 2009, RV.