First Page | Document Content | |
---|---|---|
Date: 2013-03-13 12:33:24Cryptography Error detection and correction Mathematics Digital signature Hash function Coding theory Public-key cryptography Substitution Fuzzy extractor | Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.GAdd to Reading ListSource URL: software.imdea.orgDownload Document from Source WebsiteFile Size: 233,46 KBShare Document on Facebook |
Lecture Notes on Virtual Substitution & Real ArithmeticDocID: 1xUTv - View Document | |
Towards Conflict-Driven Learning for Virtual Substitution SMT Workshop ˇ Marek Kosta (joint work K. Korovin and T. Sturm)DocID: 1xUsN - View Document | |
LIVELIHOOD SUBSTITUTION: THE CASE OF THE LYARI EXPRESSWAYDocID: 1vjHF - View Document | |
Hereditary Substitution for the λ∆-Calculus Harley Eades and Aaron Stump Computer Science CL&C 2012 OverviewDocID: 1vi0p - View Document | |
Matthieu Fontaine - L’échec de la généralisation existentielle et de la substitution des identiques chez HintikkaDocID: 1vfiN - View Document |