Secure Composition of Cryptographic Protocols

被引:0
|
作者
Goyal, Vipul
机构
来源
PROVABLE SECURITY | 2011年 / 6980卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:2 / 2
页数:1
相关论文
共 50 条
  • [41] Cryptographic Protocols from Lattices
    Kiltz, Eike
    PROVABLE SECURITY, 2010, 6402 : 199 - 199
  • [42] Formal testing cryptographic protocols
    Igumnov, VS
    EDM 2005: International Workshop and Tutorials on Electron Devices and Materials, Proceedings, 2005, : 236 - 237
  • [43] Adoption Challenges for Cryptographic Protocols
    Fischer, Konstantin
    Trummova, Ivana
    Gajland, Phillip
    Acar, Yasemin
    Fahl, Sascha
    Sasse, M. Angela
    IEEE SECURITY & PRIVACY, 2024, 22 (06) : 19 - 29
  • [44] Trusted Multiplexing of Cryptographic Protocols
    McCarthy, Lay
    Krishnamurthi, Shriram
    FORMAL ASPECTS IN SECURITY AND TRUST, 2010, 5983 : 217 - +
  • [45] Verifiable Verification in Cryptographic Protocols
    Fischlin, Marc
    Gunther, Felix
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3239 - 3253
  • [46] Compiling and securing cryptographic protocols
    Chevalier, Yannick
    Rusinowitch, Michael
    INFORMATION PROCESSING LETTERS, 2010, 110 (03) : 116 - 122
  • [47] Authenticity types for cryptographic protocols
    Gordon, A
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 3 - 3
  • [48] Synthesising attacks on cryptographic protocols
    Sinclair, D
    Gray, D
    Hamilton, G
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 49 - 63
  • [49] Identification codes in cryptographic protocols
    Bringer, Julien
    Chabanne, Herve
    Cohen, Gerard
    Kindarji, Bruno
    2010 IEEE INFORMATION THEORY WORKSHOP (ITW), 2010,
  • [50] A FRAMEWORK FOR THE STUDY OF CRYPTOGRAPHIC PROTOCOLS
    BERGER, R
    KANNAN, S
    PERALTA, R
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 87 - 103