Secure Composition of Cryptographic Protocols

被引:0
|
作者
Goyal, Vipul
机构
来源
PROVABLE SECURITY | 2011年 / 6980卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:2 / 2
页数:1
相关论文
共 50 条
  • [31] A rational approach to cryptographic protocols
    Caballero-Gil, P.
    Henandez-Goya, C.
    Bruno-Castaneda, C.
    MATHEMATICAL AND COMPUTER MODELLING, 2007, 46 (1-2) : 80 - 87
  • [32] Visualization of cryptographic protocols with GRACE
    Cattaneo, G.
    De Santis, A.
    Petrillo, U. Ferraro
    JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2008, 19 (02): : 258 - 290
  • [33] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
  • [34] INFORMATION-THEORETICALLY SECURE PROTOCOLS AND SECURITY UNDER COMPOSITION
    Kushilevitz, Eyal
    Lindell, Yehuda
    Rabin, Tal
    SIAM JOURNAL ON COMPUTING, 2010, 39 (05) : 2090 - 2112
  • [35] Superposition Attacks on Cryptographic Protocols
    Damgard, Ivan
    Funder, Jakob
    Nielsen, Jesper Buus
    Salvail, Louis
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
  • [36] Sequential Rationality in Cryptographic Protocols
    Gradwohl, Ronen
    Livne, Noam
    Rosen, Alon
    2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 623 - 632
  • [37] HIDDEN ASSUMPTIONS IN CRYPTOGRAPHIC PROTOCOLS
    BOYD, C
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1990, 137 (06): : 433 - 436
  • [38] Runtime verification of cryptographic protocols
    Bauer, Andreas
    Juerjens, Jan
    COMPUTERS & SECURITY, 2010, 29 (03) : 315 - 330
  • [39] Transformations between Cryptographic Protocols
    Guttman, Joshua D.
    FOUNDATIONS AND APPLICATIONS OF SECURITY ANALYSIS, 2009, 5511 : 107 - 123
  • [40] Cryptographic protocols with everyday objects
    Heather, James
    Schneider, Steve
    Teague, Vanessa
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 37 - 62