Provable implementations of security protocols

被引:5
|
作者
Gordon, Andrew D.
机构
关键词
D O I
10.1109/LICS.2006.43
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:345 / 346
页数:2
相关论文
共 50 条
  • [21] Why provable security matters?
    Stern, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 449 - 461
  • [22] On the Provable Security of the Dragonfly Protocol
    Lancrenon, Jean
    Skrobot, Marjan
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 244 - 261
  • [23] Provable Security in Quantum Cryptography
    Renner, Renato
    IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 127 - 130
  • [24] Special issue on provable security
    Jiang, Shaoquan
    Takagi, Tsuyoshi
    Wang, Guilin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1635 - 1637
  • [25] Another Look at "Provable Security"
    Neal Koblitz
    Alfred J. Menezes
    Journal of Cryptology, 2007, 20 : 3 - 37
  • [26] Codes and Provable Security of Ciphers
    Daemen, Joan
    Rijmen, Vincent
    ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES, 2009, 23 : 69 - 80
  • [27] Data Deletion with Provable Security
    Klonowski, Marek
    Przykucki, Michal
    Struminski, Tomasz
    INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 240 - 255
  • [28] Another Look at Provable Security
    Menezes, Alfred
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 8 - 8
  • [29] On provable security for conventional cryptography
    Vaudenay, S
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 1 - 16
  • [30] Cryptography and the methodology of provable security
    Stern, J
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 1 - 5