Jan Jürjens. Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. Electronic Notes in Theoretical Computer Science, 250(1):123-136, 2009. [doi]
@article{Jurjens09-0, title = {Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project}, author = {Jan Jürjens}, year = {2009}, doi = {10.1016/j.entcs.2009.08.009}, url = {http://dx.doi.org/10.1016/j.entcs.2009.08.009}, tags = {protocol, security}, researchr = {https://researchr.org/publication/Jurjens09-0}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {250}, number = {1}, pages = {123-136}, }