The following pages link to Theory of Cryptography (Q5898365):
Displayed 12 items.
- A survey of symbolic methods in computational analysis of cryptographic systems (Q540683) (← links)
- Computationally sound implementations of equational theories against passive adversaries (Q1013091) (← links)
- Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings (Q1761600) (← links)
- Reconciling non-malleability with homomorphic encryption (Q2408582) (← links)
- The reactive simulatability (RSIM) framework for asynchronous systems (Q2464139) (← links)
- OAEP Is Secure under Key-Dependent Messages (Q3600394) (← links)
- Cryptographic Protocol Composition via the Authentication Tests (Q3617737) (← links)
- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols (Q3631369) (← links)
- Automating Computational Proofs for Public-Key-Based Key Exchange (Q4933211) (← links)
- On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography (Q5458826) (← links)
- Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups (Q5505468) (← links)
- Universally Composable Security Analysis of TLS (Q5505479) (← links)