Ideal Key Derivation and Encryption in Simulation-Based Security
From MaRDI portal
Publication:3073705
DOI10.1007/978-3-642-19074-2_12zbMATH Open1284.94085OpenAlexW1495938613MaRDI QIDQ3073705FDOQ3073705
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_12
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Modular Security Analysis of the TLS Handshake Protocol
- Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
- On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
- Theory of Cryptography
- Advances in Cryptology - CRYPTO 2003
- Inductive Proofs of Computational Secrecy
- Universally Composable Security Analysis of TLS
- Polynomial runtime and composability
- Ideal Key Derivation and Encryption in Simulation-Based Security
Cited In (4)
This page was built for publication: Ideal Key Derivation and Encryption in Simulation-Based Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073705)