Simulation based security in the applied pi calculus
From MaRDI portal
Publication:2920124
Recommendations
- Computational and Information Science
- The security pi-calculus and non-interference
- Theory of Cryptography
- On the relationships between notions of simulation-based security
- Secure two-party computation in applied pi-calculus: models and verification
- On the achievability of simulation-based security for functional encryption
- Secure non-interactive simulation: feasibility and rate
Cited in
(5)- On the relationships between notions of simulation-based security
- The Applied Pi Calculus
- Automated verification of equivalence properties of cryptographic protocols
- Secure two-party computation in applied pi-calculus: models and verification
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
This page was built for publication: Simulation based security in the applied pi calculus
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2920124)