共 50 条
- [22] Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 359 - 373
- [24] A method for automatic cryptographic protocol verification (extended abstract) PARALLEL AND DISTRIBUTED PROCESSING, PROCEEDINGS, 2000, 1800 : 977 - 984
- [25] USING DEDUCTIVE KNOWLEDGE TO IMPROVE CRYPTOGRAPHIC PROTOCOL VERIFICATION MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 635 - 641
- [26] Modeling for security verification of a cryptographic protocol with MAC payload ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 538 - 547
- [27] Formal Verification of Cryptographic Protocol for Secure RFID System NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 470 - 477
- [28] ALGORITHMS FOR AUTOMATED PROTOCOL VERIFICATION AT&T TECHNICAL JOURNAL, 1990, 69 (01): : 32 - 44
- [29] A Generic Methodology for the Modular Verification of Security Protocol Implementations PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1377 - 1391
- [30] CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6843 - 6860