Theory of Cryptography
From MaRDI portal
Publication:5898365
DOI10.1007/11681878zbMath1112.94025WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898365
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
94A62: Authentication, digital signatures and secret sharing
Related Items
Automating Computational Proofs for Public-Key-Based Key Exchange, On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography, Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups, Universally Composable Security Analysis of TLS, A survey of symbolic methods in computational analysis of cryptographic systems, Computationally sound implementations of equational theories against passive adversaries, Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings, Reconciling non-malleability with homomorphic encryption, The reactive simulatability (RSIM) framework for asynchronous systems, OAEP Is Secure under Key-Dependent Messages, Cryptographic Protocol Composition via the Authentication Tests, Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols
Uses Software