A privacy-preserving secure framework for electric vehicles in IoT using matching market and signcryption

G Kumar, R Saha, MK Rai… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The present world of vehicle technology is inclined to develop Electric Vehicles (EVs) with
various optimized features. These vehicles need frequent charging which takes a longer …

EasyPQC: Verifying post-quantum cryptography

M Barbosa, G Barthe, X Fan, B Grégoire… - Proceedings of the …, 2021 - dl.acm.org
EasyCrypt is a formal verification tool used extensively for formalizing concrete security
proofs of cryptographic constructions. However, the EasyCrypt formal logics consider only …

Formally Verifying Kyber: Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt

JB Almeida, S Arranz Olmos, M Barbosa… - Annual International …, 2024 - Springer
We present a formally verified proof of the correctness and IND-CCA security of ML-KEM, the
Kyber-based Key Encapsulation Mechanism (KEM) undergoing standardization by NIST …

Formally verifying Kyber

JB Almeida, SA Olmos, M Barbosa, G Barthe… - 2024 - hal.science
We present a formally verified proof of the correctness and IND-CCA security of ML-KEM, the
Kyber-based Key Encapsulation Mechanism (KEM) undergoing standardization by NIST …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

[PDF][PDF] 后量子密码迁移趋势下应用于区块链的公钥密码安全

胡希, 向宏, 丁津泰, 梁蓓, 夏鲁宁, 向涛 - 密码学报, 2023 - bimsa.net
自从发现量子算法能够高效求解现今公钥密码依赖的数学困难问题, 能够抵抗量子计算攻击的后
量子密码算法成为研究热点, 国际上对后量子密码算法的标准化工作也已相继启动 …

GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols

X Xie, Y Li, W Zhang, T Wang, S Xu, J Zhu… - 2024 IEEE Symposium …, 2024 - computer.org
Proving the security of a Multiparty Computation (MPC) protocol is a difficult task. Under the
current simulation-based definition of MPC, a security proof consists of a simulator, which is …

Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review

Y Xu, Z Li, N Dong, V Kuchta, Z Hou, D Liu - International Conference on …, 2025 - Springer
In the quantum computing era, the imperative role of post-quantum cryptography in securing
digital communications has led to the development of computer-aided cryptography …

Symbolic methods in computational cryptography proofs

G Barthe, B Grégoire, C Jacomme… - 2019 IEEE 32nd …, 2019 - ieeexplore.ieee.org
Code-based game-playing is a popular methodology for proving security of cryptographic
constructions and side-channel countermeasures. This methodology relies on treating …

Improving automated protocol verification: real world cryptography

D Jackson - 2020 - ora.ox.ac.uk
Analysing the security of cryptographic protocols by hand is a challenging endeavour. It
requires substantial expertise, weeks of intensive effort and the resulting proof of security …