Information Security and Cryptology - ICISC 2003
From MaRDI portal
Publication:5714151
DOI10.1007/b96249zbMath1092.68600OpenAlexW2493429532MaRDI QIDQ5714151
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b96249
Related Items (5)
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings ⋮ A survey of symbolic methods in computational analysis of cryptographic systems ⋮ Computationally sound implementations of equational theories against passive adversaries ⋮ Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks ⋮ Soundness of Formal Encryption in the Presence of Key-Cycles
This page was built for publication: Information Security and Cryptology - ICISC 2003