{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:25:22Z","timestamp":1725791122890},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642547911"},{"type":"electronic","value":"9783642547928"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54792-8_13","type":"book-chapter","created":{"date-parts":[[2014,3,21]],"date-time":"2014-03-21T09:35:12Z","timestamp":1395394512000},"page":"240-244","source":"Crossref","is-referenced-by-count":1,"title":["Compiling CAO: From Cryptographic Specifications to C Implementations"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Barbosa","sequence":"first","affiliation":[]},{"given":"David","family":"Castro","sequence":"additional","affiliation":[]},{"given":"Paulo F.","family":"Silva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-29320-7_21","volume-title":"Fundamentals of Software Engineering","author":"M. Barbosa","year":"2012","unstructured":"Barbosa, M., Moss, A., Page, D., Rodrigues, N.F., Silva, P.F.: Type checking cryptography implementations. In: Arbab, F., Sirjani, M. (eds.) FSEN 2011. LNCS, vol.\u00a07141, pp. 316\u2013334. Springer, Heidelberg (2012)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/11586821_16","volume-title":"Cryptography and Coding","author":"M. Barbosa","year":"2005","unstructured":"Barbosa, M., Page, D.: On the automatic construction of indistinguishable operations. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol.\u00a03796, pp. 233\u2013247. Springer, Heidelberg (2005)"},{"key":"13_CR3","unstructured":"Barbosa, M., Pinto, J., Filli\u00e2tre, J.C., Vieira, B.: A deductive verification platform for cryptographic software. Electronic Communications of the EASST\u00a033 (2010)"},{"issue":"4","key":"13_CR4","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1145\/115372.115320","volume":"13","author":"R. Cytron","year":"1991","unstructured":"Cytron, R., Ferrante, J., Rosen, B.K., Wegman, M.N., Zadeck, F.K.: Efficiently computing static single assignment form and the control dependence graph. ACM Trans. Program. Lang. Syst (TOPLAS)\u00a013(4), 451\u2013490 (1991)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/3-540-48294-6_13","volume-title":"Static Analysis","author":"V.C. Sreedhar","year":"1999","unstructured":"Sreedhar, V.C., Ju, R.D.-C., Gillies, D.M., Santhanam, V.: Translating out of static single assignment form. In: Cortesi, A., Fil\u00e9, G. (eds.) SAS 1999. LNCS, vol.\u00a01694, pp. 194\u2013210. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54792-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T08:15:50Z","timestamp":1558858550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54792-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642547911","9783642547928"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54792-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}