Computationally sound implementations of equational theories against passive adversaries
From MaRDI portal
(Redirected from Publication:1013091)
Recommendations
Cites work
- scientific article; zbMATH DE number 1692935 (Why is no real title available?)
- scientific article; zbMATH DE number 1759457 (Why is no real title available?)
- scientific article; zbMATH DE number 1418256 (Why is no real title available?)
- Analysing password protocol security against off-line dictionary attacks
- Automata, Languages and Programming
- Automata, Languages and Programming
- Automata, Languages and Programming
- Automata, Languages and Programming
- Foundations of Software Science and Computation Structures
- Information Security and Cryptology - ICISC 2003
- Invertible Universal Hashing and the TET Encryption Mode
- Mobile values, new names, and secure communication
- On the security of public key protocols
- Probabilistic encryption
- Programming Languages and Systems
- Programming Languages and Systems
- Quantifying probabilistic information flow in computational reactive systems
- Soundness of Formal Encryption in the Presence of Key-Cycles
- Symmetric authentication within a simulatable cryptographic library
- The RSA Group is Pseudo-Free
- Theory of Cryptography
- Theory of Cryptography
Cited in
(6)- Reducing equational theories for the decision of static equivalence
- Foundations of Software Science and Computation Structures
- Reducing equational theories for the decision of static equivalence
- Model Checking Security Protocols
- A survey of symbolic methods in computational analysis of cryptographic systems
- Automata, Languages and Programming
This page was built for publication: Computationally sound implementations of equational theories against passive adversaries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1013091)