<--- Back to Details
First PageDocument Content
Cryptography / Error detection and correction / Mathematics / Digital signature / Hash function / Coding theory / Public-key cryptography / Substitution / Fuzzy extractor
Date: 2013-03-13 12:33:24
Cryptography
Error detection and correction
Mathematics
Digital signature
Hash function
Coding theory
Public-key cryptography
Substitution
Fuzzy extractor

Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G

Add to Reading List

Source URL: software.imdea.org

Download Document from Source Website

File Size: 233,46 KB

Share Document on Facebook

Similar Documents

Lecture Notes on Virtual Substitution & Real Arithmetic

Lecture Notes on Virtual Substitution & Real Arithmetic

DocID: 1xUTv - View Document

Towards Conflict-Driven Learning for Virtual Substitution SMT Workshop ˇ Marek Kosta (joint work K. Korovin and T. Sturm)

Towards Conflict-Driven Learning for Virtual Substitution SMT Workshop ˇ Marek Kosta (joint work K. Korovin and T. Sturm)

DocID: 1xUsN - View Document

LIVELIHOOD SUBSTITUTION: THE CASE OF THE LYARI EXPRESSWAY

LIVELIHOOD SUBSTITUTION: THE CASE OF THE LYARI EXPRESSWAY

DocID: 1vjHF - View Document

Hereditary Substitution for the λ∆-Calculus Harley Eades and Aaron Stump Computer Science CL&C 2012  Overview

Hereditary Substitution for the λ∆-Calculus Harley Eades and Aaron Stump Computer Science CL&C 2012 Overview

DocID: 1vi0p - View Document

Matthieu Fontaine - L’échec de la généralisation existentielle et de la substitution des identiques chez Hintikka

Matthieu Fontaine - L’échec de la généralisation existentielle et de la substitution des identiques chez Hintikka

DocID: 1vfiN - View Document