Information Security and Cryptology - ICISC 2003
From MaRDI portal
Publication:5714151
DOI10.1007/B96249zbMATH Open1092.68600OpenAlexW2493429532MaRDI QIDQ5714151FDOQ5714151
Authors: Peeter Laud, Ricardo Corin
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b96249
Recommendations
Cited In (10)
- Title not available (Why is that?)
- Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
- Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
- Soundness of Formal Encryption in the Presence of Key-Cycles
- Computationally sound implementations of equational theories against passive adversaries
- Advances in Cryptology - CRYPTO 2003
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- Title not available (Why is that?)
- A survey of symbolic methods in computational analysis of cryptographic systems
This page was built for publication: Information Security and Cryptology - ICISC 2003
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5714151)