Publication:3113670
From MaRDI portal
DOI10.4230/LIPIcs.STACS.2011.29zbMath1230.68141MaRDI QIDQ3113670
Hubert Comon-Lundh, Véronique Cortier
Publication date: 23 January 2012
Full work available at URL: http://subs.emis.de/LIPIcs/frontdoor_6d75.html
94A60: Cryptography
68Q60: Specification and verification (program logics, model checking, etc.)
68N30: Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.)
Related Items
Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups, A survey of symbolic methods in computational analysis of cryptographic systems, Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later, Ideal Key Derivation and Encryption in Simulation-Based Security