Provable implementations of security protocols

被引:5
|
作者
Gordon, Andrew D.
机构
关键词
D O I
10.1109/LICS.2006.43
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:345 / 346
页数:2
相关论文
共 50 条
  • [41] PROVABLE SECURITY AGAINST A DIFFERENTIAL ATTACK
    NYBERG, K
    KNUDSEN, LR
    JOURNAL OF CRYPTOLOGY, 1995, 8 (01) : 27 - 37
  • [42] Limits in the Provable Security of ECDSA Signatures
    Hartmann, Dominik
    Kiltz, Eike
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 279 - 309
  • [43] NETWORKS ON CHIP WITH PROVABLE SECURITY PROPERTIES
    Wassel, Hassan M. G.
    Gao, Ying
    Oberg, Jason K.
    Huffmire, Ted
    Kastner, Ryan
    Chong, Frederic T.
    Sherwood, Timothy
    IEEE MICRO, 2014, 34 (03) : 57 - 68
  • [44] Provable security for public key schemes
    Pointcheval, D
    CONTEMPORARY CRYPTOLOGY, 2005, : 133 - 190
  • [45] On the provable security of BEAR and LION schemes
    Lara Maines
    Matteo Piva
    Anna Rimoldi
    Massimiliano Sala
    Applicable Algebra in Engineering, Communication and Computing, 2011, 22 : 413 - 423
  • [46] Fundamental problems in provable security and cryptography
    Dent, Alexander W.
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2006, 364 (1849): : 3215 - 3230
  • [47] Limits of Provable Security for Homomorphic Encryption
    Bogdanov, Andrej
    Lee, Chin Ho
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 111 - 128
  • [48] Performance modeling of multiprocessor implementations of protocols
    Bjorkman, M
    Gunningberg, P
    IEEE-ACM TRANSACTIONS ON NETWORKING, 1998, 6 (03) : 262 - 273
  • [49] FLEXIBLE AND EFFICIENT IMPLEMENTATIONS OF COMMUNICATION PROTOCOLS
    FELDHOFFER, M
    FROHLICH, B
    UPPER LAYER PROTOCOLS, ARCHITECTURES AND APPLICATIONS, 1994, 25 : 3 - 13
  • [50] Flexible and efficient implementations of communication protocols
    Feldhoffer, Magdalena
    Frohlich, Bernd
    IFIP Transactions C: Communication Systems, 1994, (C-25): : 3 - 14