Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience (Q3100218): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Survey: Leakage Resilience and the Bounded Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proofs of randomized algorithms in Coq / rank
 
Normal rank
Property / cites work
 
Property / cites work: Formal certification of code-based cryptographic proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A survey of symbolic methods in computational analysis of cryptographic systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interacting with Modal Logics in the Coq Proof Assistant / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal randomizer efficiency in the bounded-storage model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Logics for reasoning about cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage Resilient ElGamal Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conditionally-perfect secrecy and a provably-secure randomized cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4365732 / rank
 
Normal rank

Latest revision as of 15:51, 4 July 2024

scientific article
Language Label Description Also known as
English
Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience
scientific article

    Statements

    Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience (English)
    0 references
    0 references
    0 references
    0 references
    22 November 2011
    0 references
    provable cryptography
    0 references
    formal verification
    0 references
    computational model
    0 references
    security protocol
    0 references
    intrusion resilience
    0 references

    Identifiers