Computational soundness of symbolic analysis for protocols using hash functions (Q2866733)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Computational soundness of symbolic analysis for protocols using hash functions |
scientific article; zbMATH DE number 6238546
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Computational soundness of symbolic analysis for protocols using hash functions |
scientific article; zbMATH DE number 6238546 |
Statements
13 December 2013
0 references
security
0 references
cryptographic protocols
0 references
formal encryption
0 references
probabilistic encryption
0 references
keyed hash function
0 references
Dolev-Yao model
0 references
computational model
0 references
Computational soundness of symbolic analysis for protocols using hash functions (English)
0 references
0.8445380330085754
0 references
0.8341814279556274
0 references
0.8262682557106018
0 references
0.8098273873329163
0 references
0.8030246496200562
0 references