Secure Composition of Cryptographic Protocols

被引:0
|
作者
Goyal, Vipul
机构
来源
PROVABLE SECURITY | 2011年 / 6980卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:2 / 2
页数:1
相关论文
共 50 条
  • [21] Cryptography and cryptographic protocols
    Oded Goldreich
    Distributed Computing, 2003, 16 : 177 - 199
  • [22] Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
    Ran Cohen
    Sandro Coretti
    Juan Garay
    Vassilis Zikas
    Journal of Cryptology, 2021, 34
  • [23] How to secure network application systems using cryptographic protocols - Electronic voting systems case
    Sako, K
    NEC RESEARCH & DEVELOPMENT, 2002, 43 (03): : 191 - 194
  • [24] How to secure network application systems using cryptographic protocols - Electronic voting systems case
    Sako, Kazue
    NEC Research and Development, 2002, 43 (03): : 191 - 194
  • [25] Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
    Cohen, Ran
    Coretti, Sandro
    Garay, Juan
    Zikas, Vassilis
    JOURNAL OF CRYPTOLOGY, 2021, 34 (02)
  • [26] Special Issue on Cryptographic Protocols
    Vogt, Andreas
    CRYPTOGRAPHY, 2018, 2 (03)
  • [27] A bisimulation method for cryptographic protocols
    Abadi, M
    Gordon, AD
    PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26
  • [28] Sequential rationality in cryptographic protocols
    Gradwohl, Ronen
    Livne, Noam
    Rosen, Alon
    ACM Transactions on Economics and Computation, 2013, 1 (01)
  • [29] Composition of secure multi-party protocols - A comprehensive study
    Goldreich, O
    COMPOSITION OF SECURE MULTI-PARTY PROTOCOLS: A COMPREHENSIVE STUDY, 2003, 2815 : VII - +
  • [30] Searching for shapes in cryptographic protocols
    Doghmi, Shaddin F.
    Guttman, Joshua D.
    Thayer, F. Javier
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 523 - 537