Provable implementations of security protocols

被引:5
|
作者
Gordon, Andrew D.
机构
关键词
D O I
10.1109/LICS.2006.43
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:345 / 346
页数:2
相关论文
共 50 条
  • [31] Provable security of proxy signature schemes
    Gu, CX
    Zhu, YF
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063
  • [32] Provable Security for Outsourcing Database Operations
    Evdokimov, Sergei
    Fischmann, Matthias
    Guenther, Oliver
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (01) : 1 - 17
  • [33] Another look at "provable security" - II
    Koblitz, Neal
    Menezes, Alfred
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 148 - +
  • [34] Quantum proxy signature with provable security
    Xin, Xiangjun
    Yang, Qinglan
    Li, Fagen
    MODERN PHYSICS LETTERS A, 2020, 35 (24)
  • [35] Towards provable security for ubiquitous applications
    Burmester, Mike
    Van Le, Tri
    de Medeiros, Breno
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 295 - 312
  • [36] The Provable Extracting Security of Information Hiding
    Liu Jing
    Tang Guang-ming
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 519 - 524
  • [37] On the Provable Security of (EC)DSA Signatures
    Fersch, Manuel
    Kiltz, Eike
    Poettering, Bertram
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1651 - 1662
  • [38] Efficient steganography with provable security guarantees
    Kiayias, A
    Raekow, Y
    Russell, A
    INFORMATION HIDING, 2005, 3727 : 118 - 130
  • [39] Provable security for block ciphers by decorrelation
    Vaudenay, S
    STACS 98 - 15TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1998, 1373 : 249 - 275
  • [40] On the provable security of BEAR and LION schemes
    Maines, Lara
    Piva, Matteo
    Rimoldi, Anna
    Sala, Massimiliano
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2011, 22 (5-6) : 413 - 423