Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SoK: Computer-aided cryptography
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …
formal, machine-checkable approaches to the design, analysis, and implementation of …
HACL*: A verified modern cryptographic library
HACL* is a verified portable C cryptographic library that implements modern cryptographic
primitives such as the ChaCha20 and Salsa20 encryption algorithms, Poly1305 and HMAC …
primitives such as the ChaCha20 and Salsa20 encryption algorithms, Poly1305 and HMAC …
Verified models and reference implementations for the TLS 1.3 standard candidate
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …
design is a reaction both to the increasing demand for low-latency HTTPS connections and …
Jasmin: High-assurance and high-speed cryptography
Jasmin is a framework for develo** high-speed and high-assurance cryptographic
software. The framework is structured around the Jasmin programming language and its …
software. The framework is structured around the Jasmin programming language and its …
Simple high-level code for cryptographic arithmetic: With proofs, without compromises
We introduce an unusual approach for implementing cryptographic arithmetic in short high-
level code with machinechecked proofs of functional correctness. We further demonstrate …
level code with machinechecked proofs of functional correctness. We further demonstrate …
Verified low-level programming embedded in F
We present Low*, a language for low-level programming and verification, and its application
to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a …
to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a …
Evercrypt: A fast, verified, cross-platform cryptographic provider
We present EverCrypt: a comprehensive collection of verified, high-performance
cryptographic functionalities available via a carefully designed API. The API provably …
cryptographic functionalities available via a carefully designed API. The API provably …
Vale: Verifying {High-Performance} cryptographic assembly code
B Bond, C Hawblitzel, M Kapritsos, KRM Leino… - 26th USENIX security …, 2017 - usenix.org
High-performance cryptographic code often relies on complex hand-tuned assembly
language that is customized for individual hardware platforms. Such code is difficult to …
language that is customized for individual hardware platforms. Such code is difficult to …
Everest: Towards a verified, drop-in replacement of HTTPS
The HTTPS ecosystem is the foundation on which Internet security is built. At the heart of this
ecosystem is the Transport Layer Security (TLS) protocol, which in turn uses the X. 509 …
ecosystem is the Transport Layer Security (TLS) protocol, which in turn uses the X. 509 …
Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications
R Harkanson, Y Kim - Proceedings of the 12th annual conference on …, 2017 - dl.acm.org
Elliptic curve cryptography (ECC) is a relatively newer form of public key cryptography that
provides more security per bit than other forms of cryptography still being used today. We …
provides more security per bit than other forms of cryptography still being used today. We …