Simulation based security in the applied pi calculus
From MaRDI portal
Publication:2920124
DOI10.4230/LIPICS.FSTTCS.2009.2316zbMATH Open1250.94035OpenAlexW1684428352MaRDI QIDQ2920124FDOQ2920124
Authors: Stéphanie Delaune, Steve Kremer, Olivier Pereira
Publication date: 24 October 2012
Full work available at URL: http://subs.emis.de/LIPIcs/frontdoor_2e05.html
Recommendations
- Computational and Information Science
- The security pi-calculus and non-interference
- Theory of Cryptography
- On the relationships between notions of simulation-based security
- Secure two-party computation in applied pi-calculus: models and verification
- On the achievability of simulation-based security for functional encryption
- Secure non-interactive simulation: feasibility and rate
Cryptography (94A60) Logic in computer science (03B70) Authentication, digital signatures and secret sharing (94A62)
Cited In (5)
- On the relationships between notions of simulation-based security
- The Applied Pi Calculus
- Automated verification of equivalence properties of cryptographic protocols
- Secure two-party computation in applied pi-calculus: models and verification
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
Uses Software
This page was built for publication: Simulation based security in the applied pi calculus
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2920124)