Secure Composition of Cryptographic Protocols

被引:0
|
作者
Goyal, Vipul
机构
来源
PROVABLE SECURITY | 2011年 / 6980卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:2 / 2
页数:1
相关论文
共 50 条
  • [1] Secure Composition of Cryptographic Protocols
    Goyal, Vipul
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 71 - 71
  • [2] Cryptographic Protocols for Secure Cloud Computing
    Alhumrani, S. A.
    Kar, Jayaprakash
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
  • [3] Comparse: Provably Secure Formats for Cryptographic Protocols
    Wallez, Theophile
    Protzenko, Jonathan
    Bhargavan, Karthikeyan
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 564 - 578
  • [4] Secure Composition of Protocols
    Cortier, Veronique
    THEORY OF SECURITY AND APPLICATIONS, 2012, 6993 : 29 - 32
  • [5] Security and composition of multiparty cryptographic protocols
    Canetti, R
    JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 143 - 202
  • [6] Security and Composition of Multiparty Cryptographic Protocols
    Ran Canetti
    Journal of Cryptology, 2000, 13 : 143 - 202
  • [7] Security and composition of cryptographic protocols: A tutorial
    Canetti, R., 1600, IOS Press BV (10):
  • [8] Cryptographic protocols for secure second-price auctions
    Brandt, F
    COOPERATIVE INFORMATION AGENTS V, PROCEEDINGS, 2001, 2182 : 154 - 165
  • [9] Cryptographic Primitives for Building Secure and Privacy Respecting Protocols
    Camenisch, Jan
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 361 - 361
  • [10] Suitable Symbolic Models for Cryptographic Verification of Secure Protocols in ProVerif
    Okazaki, Hiroyuki
    Futa, Yuichi
    Arai, Kenichi
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 326 - 330