From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Proving Expected Sensitivity of Probabilistic Programs., , , , и . CoRR, (2017)Probabilistic Relational Hoare Logics for Computer-Aided Security Proofs., , и . MPC, том 7342 из Lecture Notes in Computer Science, стр. 1-6. Springer, (2012)Symbolic Synthesis of Indifferentiability Attacks., , , и . AsiaCCS, стр. 667-681. ACM, (2022)Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium., , , , , , , , , и . CRYPTO (5), том 14085 из Lecture Notes in Computer Science, стр. 358-389. Springer, (2023)Deriving an Information Flow Checker and Certifying Compiler for Java., , и . S&P, стр. 230-242. IEEE Computer Society, (2006)SoK: Practical Foundations for Spectre Defenses., , , , и . CoRR, (2021)Coupling proofs are probabilistic product programs., , , и . POPL, стр. 161-174. ACM, (2017)Formally verifying Kyber Part I: Implementation Correctness., , , , , , , , , и 2 other автор(ы). IACR Cryptol. ePrint Arch., (2023)Certificate Translation.. VERIFY, том 372 из CEUR Workshop Proceedings, CEUR-WS.org, (2008)Formal Methods for Smartcard Security., и . FOSAD, том 3655 из Lecture Notes in Computer Science, стр. 133-177. Springer, (2005)