Ideal Key Derivation and Encryption in Simulation-Based Security
From MaRDI portal
Publication:3073705
DOI10.1007/978-3-642-19074-2_12zbMath1284.94085OpenAlexW1495938613MaRDI QIDQ3073705
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_12
Related Items (3)
Embedding the UC model into the IITM model ⋮ The IITM model: a simple and expressive model for universal composability ⋮ Ideal Key Derivation and Encryption in Simulation-Based Security
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Polynomial runtime and composability
- Ideal Key Derivation and Encryption in Simulation-Based Security
- Inductive Proofs of Computational Secrecy
- A Modular Security Analysis of the TLS Handshake Protocol
- Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
- Advances in Cryptology - CRYPTO 2003
- On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
- Universally Composable Security Analysis of TLS
- Theory of Cryptography
This page was built for publication: Ideal Key Derivation and Encryption in Simulation-Based Security