Pages that link to "Item:Q5030211"
From MaRDI portal
The following pages link to Symmetric Authentication within a Simulatable Cryptographic Library (Q5030211):
Displaying 14 items.
- Weakening the perfect encryption assumption in Dolev-Yao adversaries (Q557896) (← links)
- Computationally sound implementations of equational theories against passive adversaries (Q1013091) (← links)
- Unifying simulatability definitions in cryptographic systems under different timing assumptions (Q2484407) (← links)
- Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later (Q2945721) (← links)
- Composable Security in the Bounded-Quantum-Storage Model (Q3519536) (← links)
- On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography (Q5458826) (← links)
- Statistical Security Conditions for Two-Party Secure Function Evaluation (Q5502794) (← links)
- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol (Q5862307) (← links)
- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos (Q5862527) (← links)
- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes (Q5862528) (← links)
- Conditional Reactive Simulatability (Q5862529) (← links)
- Machine-Checked Security Proofs of Cryptographic Signature Schemes (Q5862663) (← links)
- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR (Q5862666) (← links)
- Soundness of Formal Encryption in the Presence of Key-Cycles (Q5862672) (← links)