FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
From MaRDI portal
Publication:5191499
DOI10.1007/b94618zbMath1205.94073OpenAlexW2246750081MaRDI QIDQ5191499
Birgit Pfitzmann, Michael Backes
Publication date: 6 August 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b94618
Related Items
Moving the bar on computationally sound exclusive-or, Universally composable symbolic security analysis, The reactive simulatability (RSIM) framework for asynchronous systems, Unifying simulatability definitions in cryptographic systems under different timing assumptions, A survey of symbolic methods in computational analysis of cryptographic systems, Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups, Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library, A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol, Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos, Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes, Limits of the Cryptographic Realization of Dolev-Yao-Style XOR, Soundness of Formal Encryption in the Presence of Key-Cycles
Uses Software