Moving the bar on computationally sound exclusive-or
From MaRDI portal
Publication:2148759
Recommendations
Cites work
- scientific article; zbMATH DE number 1942410 (Why is no real title available?)
- scientific article; zbMATH DE number 1759457 (Why is no real title available?)
- A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
- Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystems
- Automata, Languages and Programming
- Automated proofs of block cipher modes of operation
- Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption
- Characterizing collision and second-preimage resistance in Linicrypt
- FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
- Linicrypt: a model for practical cryptography
- Mobile values, new names, and secure communication
- On the security of public key protocols
- Term Rewriting and All That
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Theory of Cryptography
Cited in
(3)
This page was built for publication: Moving the bar on computationally sound exclusive-or
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2148759)