Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
From MaRDI portal
Publication:5385984
DOI10.1007/11944836_18zbMath1177.94142MaRDI QIDQ5385984
Ralf Küsters, Véronique Cortier, Bogdan Warinschi, Steve Kremer
Publication date: 17 April 2008
Published in: FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11944836_18
94A60: Cryptography
Related Items
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography, A survey of symbolic methods in computational analysis of cryptographic systems, Sound and complete computational interpretation of symbolic hashes in the standard model, Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions, Ideal Key Derivation and Encryption in Simulation-Based Security, Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption
Uses Software