Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
State separation for code-based game-playing proofs
The security analysis of real-world protocols involves reduction steps that are conceptually
simple but still have to account for many protocol complications found in standards and …
simple but still have to account for many protocol complications found in standards and …
SSProve: A foundational framework for modular cryptographic proofs in Coq
PG Haselwarter, E Rivas, A Van Muylder… - ACM Transactions on …, 2023 - dl.acm.org
State-separating proofs (SSP) is a recent methodology for structuring game-based
cryptographic proofs in a modular way, by using algebraic laws to exploit the modular …
cryptographic proofs in a modular way, by using algebraic laws to exploit the modular …
Language-Based Security for Low-Level MPC
Secure Multi-Party Computation (MPC) is an important enabling technology for data privacy
in modern distributed applications. Currently, proof methods for low-level MPC protocols are …
in modern distributed applications. Currently, proof methods for low-level MPC protocols are …
Adaptive Distributional Security for Garbling Schemes with Online Complexity
Garbling schemes allow to garble a circuit C and an input x such that C (x) can be computed
while hiding both C and x. In the context of adaptive security, an adversary specifies the …
while hiding both C and x. In the context of adaptive security, an adversary specifies the …
Bringing state-separating proofs to EasyCrypt a security proof for cryptobox
F Dupressoir, K Kohbrok… - 2022 IEEE 35th Computer …, 2022 - ieeexplore.ieee.org
Machine-checked cryptography aims to reinforce confidence in the primitives and protocols
that underpin all digital security. However, machine-checked proof techniques remain in …
that underpin all digital security. However, machine-checked proof techniques remain in …
State-separating proofs and their applications
K Kohbrok - 2023 - aaltodoc.aalto.fi
Cryptographic protocols are commonly used to provide security for network traffic and digital
interactions in general. Security means different things in different contexts. The most …
interactions in general. Security means different things in different contexts. The most …
CryptoZoo: A Viewer for Reduction Proofs
Cryptographers rely on visualization to effectively communicate cryptographic constructions
with one another. Visual frameworks such as constructive cryptography (TOSCA 2011), the …
with one another. Visual frameworks such as constructive cryptography (TOSCA 2011), the …
Adaptive Distributional Security for Garbling Schemes with Online Complexity
Garbling schemes allow to garble a circuit $ C $ and an input $ x $ such that $ C (x) $ can be
computed while hiding both $ C $ and $ x $. In the context of adaptive security, an adversary …
computed while hiding both $ C $ and $ x $. In the context of adaptive security, an adversary …
Bringing state-separating proofs to EasyCrypt-a security proof for Cryptobox
Abstract Machine-checked cryptography aims to reinforce confidence in the primitives and
protocols that underpin all digital security. However, machine-checked proof techniques …
protocols that underpin all digital security. However, machine-checked proof techniques …
Formal Verification of the Sumcheck Protocol
AA Garvia Bosshard - 2023 - research-collection.ethz.ch
The sumcheck protocol is an interactive proof which is widely used in computational
complexity and cryptography. First introduced in 1992, the proofs of its security properties …
complexity and cryptography. First introduced in 1992, the proofs of its security properties …