Sound and complete computational interpretation of symbolic hashes in the standard model (Q2481980): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.tcs.2007.11.011 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2038704899 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Soundness of Formal Encryption in the Presence of Key-Cycles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Software Science and Computation Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5714435 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reconciling two views of cryptography (The computational soundness of formal encryption) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security analysis of cryptographically controlled access to XML documents / rank
 
Normal rank
Property / cites work
 
Property / cites work: Models of Objective Chance: An Analysis through Examples / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2743964 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364570 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The random oracle methodology, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computationally Sound Symbolic Secrecy in the Presence of Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542530 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nonmalleable Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3210163 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sound and complete computational interpretation of symbolic hashes in the standard model / rank
 
Normal rank
Property / cites work
 
Property / cites work: A computational interpretation of Dolev-Yao adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank

Revision as of 20:31, 27 June 2024

scientific article
Language Label Description Also known as
English
Sound and complete computational interpretation of symbolic hashes in the standard model
scientific article

    Statements

    Sound and complete computational interpretation of symbolic hashes in the standard model (English)
    0 references
    0 references
    0 references
    15 April 2008
    0 references
    symbolic cryptography
    0 references
    protocol verification
    0 references
    Abadi-Rogaway logic
    0 references
    Dolev-Yao model
    0 references
    oracle hashing
    0 references

    Identifiers