Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis., , , and . Proc. ACM Program. Lang., 8 (POPL): 848-881 (January 2024)Orbit Problem Revisited, , and . CoRR, (2013)Model-based Automated Testing of JavaScript Web Applications via Longer Test Sequences., , , , and . CoRR, (2019)A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs., , , and . ACM Trans. Softw. Eng. Methodol., 30 (3): 26:1-26:42 (2021)On Finite Alphabets and Infinite Bases II: Completed and Ready Simulation., , and . FoSSaCS, volume 3921 of Lecture Notes in Computer Science, page 1-15. Springer, (2006)On the Axiomatizability of Impossible Futures., , and . Logical Methods in Computer Science, (2015)Ready to preorder: The case of weak process semantics., , and . Inf. Process. Lett., 109 (2): 104-111 (2008)PoS4MPC: Automated Security Policy Synthesis for Secure Multi-party Computation., , , , and . CAV (1), volume 13371 of Lecture Notes in Computer Science, page 385-406. Springer, (2022)Making Agents' Abilities Explicit., , and . IEEE Access, (2019)Augmenting Bug Localization with Part-of-Speech and Invocation., , , and . International Journal of Software Engineering and Knowledge Engineering, 27 (6): 925-950 (2017)