On the relationships between notions of simulation-based security
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 4039251 (Why is no real title available?)
- scientific article; zbMATH DE number 42752 (Why is no real title available?)
- scientific article; zbMATH DE number 2009949 (Why is no real title available?)
- scientific article; zbMATH DE number 1487486 (Why is no real title available?)
- scientific article; zbMATH DE number 2086716 (Why is no real title available?)
- scientific article; zbMATH DE number 1842484 (Why is no real title available?)
- A calculus for cryptographic protocols: The spi calculus
- A calculus of communicating systems
- A probabilistic polynomial-time calculus for analysis of cryptographic protocols (preliminary report)
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
- Foundations of Software Science and Computation Structures
- Mobile values, new names, and secure communication
- Reactively secure signature schemes
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
- Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols
- Universally composable two-party and multi-party secure computation
Cited in
(8)- The IITM model: a simple and expressive model for universal composability
- Theory of Cryptography
- Simulation based security in the applied pi calculus
- Embedding the UC model into the IITM model
- Quantifying information flow in cryptographic systems
- A survey of symbolic methods in computational analysis of cryptographic systems
- Simulatable channels: extended security that is universally composable and easier to prove
- Conditional reactive simulatability
This page was built for publication: On the relationships between notions of simulation-based security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1021241)