Information Security and Cryptology - ICISC 2003
From MaRDI portal
Publication:5714151
Recommendations
Cited in
(10)- scientific article; zbMATH DE number 2242582 (Why is no real title available?)
- Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
- Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
- Soundness of Formal Encryption in the Presence of Key-Cycles
- Computationally sound implementations of equational theories against passive adversaries
- Advances in Cryptology - CRYPTO 2003
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- scientific article; zbMATH DE number 1759457 (Why is no real title available?)
- A survey of symbolic methods in computational analysis of cryptographic systems
This page was built for publication: Information Security and Cryptology - ICISC 2003
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5714151)