Another look at automated theorem-proving. II
Journal of Mathematical Cryptology, 5 (2011), 205-224.
I continue the discussion initiated in my earlier
paper of whether or not
computer-assisted proofs are a promising approach to preventing
errors in reductionist security arguments. I examine some recent
papers that describe automated security proofs for hashed ElGamal
encryption, Boneh-Franklin identity-based encryption, and OAEP.
Journal paper Eprint paper