A survey of symbolic methods in computational analysis of cryptographic systems (Q540683): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Foundations of Software Science and Computation Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational Secrecy by Typing for the Pi Calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographically Sound Implementations for Communicating Processes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographically-Masked Flows / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536407 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reconciling two views of cryptography (The computational soundness of formal encryption) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security analysis of cryptographically controlled access to XML documents / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computationally sound implementations of equational theories against passive adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Reasoning / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular-Secure Encryption from Decision Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4808837 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Software Science and Computation Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Security Proofs with Sequences of Games / rank
 
Normal rank
Property / cites work
 
Property / cites work: The reactive simulatability (RSIM) framework for asynchronous systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413854 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Explicit Randomness is not Necessary when Modeling Probabilistic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computationally Sound Symbolic Secrecy in the Presence of Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3113670 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programming Languages and Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deciding Key Cycles for Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol Composition Logic (PCL) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographically sound implementations for typed information-flow security / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography in the Multi-string Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sound and complete computational interpretation of symbolic hashes in the standard model / rank
 
Normal rank
Property / cites work
 
Property / cites work: A computational interpretation of Dolev-Yao adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programming Languages and Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the relationships between notions of simulation-based security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2763667 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417891 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the computational soundness of cryptographically masked flows / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology - ICISC 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fundamentals of Computation Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Software Science and Computation Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols / rank
 
Normal rank

Latest revision as of 02:40, 4 July 2024

scientific article
Language Label Description Also known as
English
A survey of symbolic methods in computational analysis of cryptographic systems
scientific article

    Statements

    A survey of symbolic methods in computational analysis of cryptographic systems (English)
    0 references
    0 references
    0 references
    0 references
    3 June 2011
    0 references
    symbolic methods
    0 references
    computational analysis
    0 references
    cryptography
    0 references
    security protocol
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers