scientific article; zbMATH DE number 1759457
From MaRDI portal
Publication:4536407
zbMath1008.68048MaRDI QIDQ4536407
Publication date: 25 November 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (26)
Private authentication ⋮ Moving the bar on computationally sound exclusive-or ⋮ Intruder deduction for the equational theory of abelian groups with distributive encryption ⋮ Automated analysis of cryptographic assumptions in generic group models ⋮ Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies ⋮ The reactive simulatability (RSIM) framework for asynchronous systems ⋮ A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols ⋮ A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols ⋮ Unifying simulatability definitions in cryptographic systems under different timing assumptions ⋮ Multi-attacker protocol validation ⋮ A survey of symbolic methods in computational analysis of cryptographic systems ⋮ A computational interpretation of Dolev-Yao adversaries ⋮ Weakening the perfect encryption assumption in Dolev-Yao adversaries ⋮ Abstractions of non-interference security: probabilistic versus possibilistic ⋮ On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography ⋮ Key-dependent message security: generic amplification and completeness ⋮ Computationally sound implementations of equational theories against passive adversaries ⋮ Safely composing security protocols ⋮ On the symbolic reduction of processes with cryptographic functions. ⋮ A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol ⋮ Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes ⋮ Machine-Checked Security Proofs of Cryptographic Signature Schemes ⋮ Limits of the Cryptographic Realization of Dolev-Yao-Style XOR ⋮ Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions ⋮ Formalizing provable anonymity in Isabelle/HOL ⋮ Symmetric Authentication within a Simulatable Cryptographic Library
This page was built for publication: