Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Round-preserving parallel composition of probabilistic-termination cryptographic protocols 2021-06-28 Paper SoK: a consensus taxonomy in the blockchain era...
    10 bytes (18 words) - 16:20, 12 December 2023
  • polynomial-time process calculus for the analysis of cryptographic protocols 2006-04-28 Paper Financial Cryptography 2005-06-13 Paper https://portal.mardi4nfdi.de/entity/Q3158991...
    10 bytes (17 words) - 22:34, 8 December 2023
  • Card-based cryptographic protocols with a standard deck of cards using private operations 2022-03-31 Paper Card-based cryptographic protocols for three-input...
    10 bytes (16 words) - 23:43, 24 September 2023
  • Powerful Privacy Notion for Voting Protocols 2012-06-08 Paper Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application...
    10 bytes (17 words) - 15:53, 10 December 2023
  • Paper Controlling the key by choosing the detection bits in quantum cryptographic protocols 2022-10-28 Paper Quantum identity authentication based on round...
    10 bytes (17 words) - 22:08, 10 December 2023
  • Paper Theory of Cryptography 2007-02-12 Paper A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols 2006-04-28 Paper...
    10 bytes (16 words) - 21:48, 21 September 2023
  • Round-preserving parallel composition of probabilistic-termination cryptographic protocols 2021-06-28 Paper Non-malleable encryption: simpler, shorter, stronger...
    10 bytes (16 words) - 18:37, 24 September 2023
  • Verifying Cryptographic Protocols with Subterms Constraints 2008-05-15 Paper Key Substitution in the Symbolic Analysis of Cryptographic Protocols 2008-04-24...
    10 bytes (16 words) - 06:00, 7 October 2023
  • 2014-07-21 Paper Protocol Composition Logic (PCL) 2013-12-06 Paper A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols 2013-04-26...
    10 bytes (18 words) - 01:56, 10 December 2023
  • minimum number of cards in practical card-based protocols 2018-02-23 Paper Card-Based Cryptographic Protocols Using a Minimal Number of Cards 2016-06-10 Paper...
    10 bytes (18 words) - 12:29, 28 January 2024
  • security protocols under convergent equational theories 2012-07-17 Paper Automated Verification of Equivalence Properties of Cryptographic Protocols 2012-06-22...
    10 bytes (16 words) - 06:00, 7 October 2023
  • composition of probabilistic-termination cryptographic protocols 2021-06-28 Paper Must the communication graph of MPC protocols be an expander? 2020-06-30 Paper...
    10 bytes (16 words) - 10:43, 24 September 2023
  • Paper Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol 2009-05-13 Paper On the Salsa20...
    10 bytes (20 words) - 03:19, 12 December 2023
  • mardi4nfdi.de/entity/Q4314051 1995-11-28 Paper Multi-exponentiation (cryptographic protocols) 1995-02-23 Paper https://portal.mardi4nfdi.de/entity/Q4314024 1995-01-08...
    10 bytes (18 words) - 15:50, 10 December 2023
  • of Publication Type Proof-Based Design of Security Protocols 2010-06-22 Paper Cryptographic Protocols Analysis in Event B 2010-02-02 Paper...
    10 bytes (16 words) - 06:11, 7 October 2023
  • deanonymization methods in the lightning protocol 2022-06-17 Paper Equivalence properties by typing in cryptographic branching protocols 2019-09-16 Paper Logical Foundations...
    10 bytes (16 words) - 02:31, 7 October 2023
  • Paper Algebra model and security analysis for cryptographic protocols 2007-02-20 Paper Cryptographic protocol security analysis based on bounded constructing...
    10 bytes (17 words) - 23:09, 11 December 2023
  • and Composability of Cryptographic Protocols 2016-11-09 Paper Network-Hiding Communication and Applications to Multi-party Protocols 2016-10-27 Paper Fair...
    10 bytes (16 words) - 18:37, 24 September 2023
  • Publication Date of Publication Type Superposition Attacks on Cryptographic Protocols 2015-09-30 Paper...
    10 bytes (16 words) - 13:56, 6 October 2023
  • of Publication Type Modelling Attacker’s Knowledge for Cascade Cryptographic Protocols 2008-11-11 Paper...
    10 bytes (16 words) - 03:18, 28 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)