Automated Analysis of Cryptographic Assumptions in Generic Group Models
Barthe G., Fagerholm E., Fiore D., Mitchell J., Schmidt B., Scedrov A.
Vol. 8616. , Springer, 2014
“The Control of technology by Nation States: Past, Present and Future - The Case of Cryptology and Information Security”
, Journal of Information Warfare 2013 Vol. 12 No. 3 P. 1-10
Added: May 15, 2020
Added: May 29, 2015