swMATH12669MaRDI QIDQ24595FDOQ24595
Author name not available (Why is that?)
Official website: http://link.springer.com/article/10.1007%2Fs00145-013-9160-y
Cited In (14)
- On the (im-)possibility of extending coin toss
- MoSS: modular security specifications framework
- The IITM model: a simple and expressive model for universal composability
- Universal composition with responsive environments
- UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module
- Universally composable cryptographic role-based access control
- CryptHOL
- Embedding the UC model into the IITM model
- Joint state composition theorems for public-key encryption and digital signature functionalities with local computation
- Polynomial runtime and composability
- An equational approach to secure multi-party computation
- A simpler variant of universally composable security for standard multiparty computation
- A modular treatment of cryptographic APIs: the symmetric-key case
- MoSS
This page was built for software: GNUC