Login / Signup
Proof Techniques for Cryptographic Processes.
Michele Boreale
Rocco De Nicola
Rosario Pugliese
Published in:
SIAM J. Comput. (2001)
Keyphrases
</>
hash functions
linear logic
databases
process model
smart card
real time
artificial intelligence
decision trees
digital libraries
computational models
theorem prover
stochastic processes