Computationally sound implementations of equational theories against passive adversaries (Q1013091): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536407 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mobile values, new names, and secure communication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2849571 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2763667 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology - ICISC 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Soundness of Formal Encryption in the Presence of Key-Cycles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symmetric Authentication within a Simulatable Cryptographic Library / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programming Languages and Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programming Languages and Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantifying Probabilistic Information Flow in Computational Reactive Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Software Science and Computation Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The RSA Group is Pseudo-Free / rank
 
Normal rank
Property / cites work
 
Property / cites work: Invertible Universal Hashing and the TET Encryption Mode / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941815 / rank
 
Normal rank

Latest revision as of 12:18, 1 July 2024

scientific article
Language Label Description Also known as
English
Computationally sound implementations of equational theories against passive adversaries
scientific article

    Statements

    Computationally sound implementations of equational theories against passive adversaries (English)
    0 references
    0 references
    0 references
    0 references
    16 April 2009
    0 references
    0 references
    cryptographic models for security protocols
    0 references
    0 references