{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:33:56Z","timestamp":1760708036858,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642007293"},{"type":"electronic","value":"9783642007309"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00730-9_23","type":"book-chapter","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T11:22:23Z","timestamp":1237288943000},"page":"368-382","source":"Crossref","is-referenced-by-count":7,"title":["On Formal Verification of Arithmetic-Based Cryptographic Primitives"],"prefix":"10.1007","author":[{"given":"David","family":"Nowak","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-540-75670-5_10","volume-title":"Provable Security","author":"R. Affeldt","year":"2007","unstructured":"Affeldt, R., Tanaka, M., Marti, N.: Formal proof of provable security by game-playing in a proof assistant. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol.\u00a04784, pp. 151\u2013168. Springer, Heidelberg (2007)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Berg, M., Unruh, D.: A formal language for cryptographic pseudocode. In: 4th Workshop on Formal and Computational Cryptography (FCC 2008) (2008)","DOI":"10.1007\/978-3-540-89439-1_26"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Barthe, G., Gr\u00e9goire, B., Janvier, R., Olmedo, F., B\u00e9guelin, S.Z.: Formal certification of code-based cryptographic proofs. In: 4th Workshop on Formal and Computational Cryptography (FCC 2008) (2008)","DOI":"10.1145\/1480881.1480894"},{"key":"23_CR4","unstructured":"Bellare, M., Rogaway, P.: Code-based game-playing proofs and the security of triple encryption. Cryptology ePrint Archive, Report 2004\/331 (2004)"},{"key":"23_CR5","first-page":"82","volume-title":"Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14)","author":"B. Blanchet","year":"2001","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14), pp. 82\u201396. IEEE Computer Society, Los Alamitos (2001)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/11818175_32","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"B. Blanchet","year":"2006","unstructured":"Blanchet, B., Pointcheval, D.: Automated security proofs with sequences of games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 537\u2013554. Springer, Heidelberg (2006)"},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo random number generator. SIAM Journal on Computing\u00a015(2), 364\u2013383 (1986); an earlier version appeared in Proceedings of Crypto 1982","journal-title":"SIAM Journal on Computing"},{"issue":"2","key":"23_CR8","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences (JCSS)\u00a028(2), 270\u2013299 (1984); an earlier version appeared in proceedings of STOC 1982","journal-title":"Journal of Computer and System Sciences (JCSS)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-540-74591-4_8","volume-title":"Theorem Proving in Higher Order Logics","author":"G. Gonthier","year":"2007","unstructured":"Gonthier, G., Mahboubi, A., Rideau, L., Tassi, E., Th\u00e9ry, L.: A modular formalisation of finite group theory. In: Schneider, K., Brandt, J. (eds.) TPHOLs 2007. LNCS, vol.\u00a04732, pp. 86\u2013101. Springer, Heidelberg (2007)"},{"key":"23_CR10","unstructured":"Halevi, S.: A plausible approach to computer-aided cryptographic proofs. Cryptology ePrint Archive, Report 2005\/181 (2005)"},{"key":"23_CR11","volume-title":"The Art of Computer Programming \u2013 Seminumerical Algorithms","author":"D.E. Knuth","year":"1969","unstructured":"Knuth, D.E.: The Art of Computer Programming \u2013 Seminumerical Algorithms, vol.\u00a02. Addison-Wesley, Reading (1969)"},{"key":"23_CR12","volume-title":"Proceedings of the 2008 ACM Conference on Computer and Communications Security","author":"P. Lafourcade","year":"2008","unstructured":"Lafourcade, P., Lakhnech, Y., Ene, C., Courant, J., Daubignard, M.: Towards automated proofs of asymmetric encryption schemes in the random oracle model. In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, ACM, New York (2008) (to appear)"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-540-77048-0_25","volume-title":"Information and Communications Security","author":"D. Nowak","year":"2007","unstructured":"Nowak, D.: A framework for game-based security proofs. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol.\u00a04861, pp. 319\u2013333. Springer, Heidelberg (2007); also available as Cryptology ePrint Archive, Report 2007\/199"},{"key":"23_CR14","first-page":"154","volume-title":"Proceedings of the 29th ACM Symposium on the Principles of Programming Languages (POPL 2002)","author":"N. Ramsey","year":"2002","unstructured":"Ramsey, N., Pfeffer, A.: Stochastic lambda calculus and monads of probability distributions. In: Proceedings of the 29th ACM Symposium on the Principles of Programming Languages (POPL 2002), pp. 154\u2013165. ACM, New York (2002)"},{"key":"23_CR15","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004\/332 (2004)"},{"key":"23_CR16","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1109\/SFCS.1984.715948","volume-title":"Proceedings of the IEEE 25th Annual Symposium on Foundations of Computer Science (FOCS 1984)","author":"U.V. Vazirani","year":"1984","unstructured":"Vazirani, U.V., Vazirani, V.V.: Efficient and secure pseudo-random number generation. In: Proceedings of the IEEE 25th Annual Symposium on Foundations of Computer Science (FOCS 1984), pp. 458\u2013463. IEEE Computer Society, Los Alamitos (1984)"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/SFCS.1982.45","volume-title":"Proceedings of the IEEE 23rd Annual Symposium on Foundations of Computer Science (FOCS 1982)","author":"A.C. Yao","year":"1982","unstructured":"Yao, A.C.: Theory and applications of trapdoor functions. In: Proceedings of the IEEE 23rd Annual Symposium on Foundations of Computer Science (FOCS 1982), pp. 80\u201391. IEEE, Los Alamitos (1982)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00730-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T21:29:05Z","timestamp":1589664545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00730-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642007293","9783642007309"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00730-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}