Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups
From MaRDI portal
Publication:5505468
DOI10.1007/978-3-540-88733-1_13zbMath1204.94074OpenAlexW1570825683MaRDI QIDQ5505468
Publication date: 27 January 2009
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-88733-1_13
Cites Work
- Unnamed Item
- Unnamed Item
- Deciding knowledge in security protocols under equational theories
- A Probabilistic Applied Pi–Calculus
- Mobile values, new names, and secure communication
- FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
- Programming Languages and Systems
- Advances in Cryptology - CRYPTO 2003
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups