Cited By
View all- Xu YLi ZDong NKuchta VHou ZLiu D(2024)Formal Verification Techniques for Post-quantum Cryptography: A Systematic ReviewEngineering of Complex Computer Systems10.1007/978-3-031-66456-4_19(346-366)Online publication date: 29-Sep-2024
- Rakotonirina IAmbrona MAguirre ABarthe GSuga YSakurai KDing XSako K(2022)Symbolic Synthesis of Indifferentiability AttacksProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security10.1145/3488932.3497759(667-681)Online publication date: 30-May-2022
- Barthe GFan XGancher JGrégoire BJacomme CShi ELie DMannan MBackes MWang X(2018)Symbolic Proofs for Lattice-Based CryptographyProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243825(538-555)Online publication date: 15-Oct-2018
- Show More Cited By