Theory of Cryptography
From MaRDI portal
Publication:5711659
DOI10.1007/B106171zbMath1079.94543OpenAlexW4251449056MaRDI QIDQ5711659
Anupam Datta, Ajith Ramanathan, Ralf Küsters, John C. Mitchell
Publication date: 7 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b106171
Related Items (9)
Polynomial runtime and composability ⋮ Adaptive security of multi-party protocols, revisited ⋮ The IITM model: a simple and expressive model for universal composability ⋮ Joint state composition theorems for public-key encryption and digital signature functionalities with local computation ⋮ The reactive simulatability (RSIM) framework for asynchronous systems ⋮ Task-structured probabilistic I/O automata ⋮ On the relationships between notions of simulation-based security ⋮ Conditional Reactive Simulatability ⋮ Soundness of Formal Encryption in the Presence of Key-Cycles
This page was built for publication: Theory of Cryptography