Signed Cryptographic Program Verification with Typed CryptoLine.
Yu-Fu FuJiaxiang LiuXiaomu ShiMing-Hsien TsaiBow-Yaw WangBo-Yin YangPublished in: CCS (2019)
Keyphrases
- higher order
- smart card
- lambda calculus
- security protocols
- hash functions
- key management
- digital signature
- data encryption standard
- artificial intelligence
- encryption key
- random number generator
- security properties
- fixed order
- differential power analysis
- real time
- secure communication
- rough sets
- website
- computer vision
- information retrieval
- databases