Moving the bar on computationally sound exclusive-or
From MaRDI portal
Publication:2148759
DOI10.1007/978-3-030-88428-4_14zbMath1499.94048OpenAlexW3203992497MaRDI QIDQ2148759
Publication date: 24 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88428-4_14
Related Items (2)
Cites Work
- Unnamed Item
- Unnamed Item
- Automated proofs of block cipher modes of operation
- Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystems
- Characterizing collision and second-preimage resistance in Linicrypt
- Linicrypt: A Model for Practical Cryptography
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
- On the security of public key protocols
- Term Rewriting and All That
- Mobile values, new names, and secure communication
- FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
- Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption
- Automata, Languages and Programming
- Theory of Cryptography
This page was built for publication: Moving the bar on computationally sound exclusive-or