Pages that link to "Item:Q540683"
From MaRDI portal
The following pages link to A survey of symbolic methods in computational analysis of cryptographic systems (Q540683):
Displaying 20 items.
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols (Q511946) (← links)
- Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings (Q1761600) (← links)
- A procedure for deciding symbolic equivalence between sets of constraint systems (Q2013557) (← links)
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068) (← links)
- Universally composable symbolic security analysis (Q2429708) (← links)
- Probabilistic Functions and Cryptographic Oracles in Higher Order Logic (Q2802495) (← links)
- A quantitative study of two attacks (Q2849572) (← links)
- Computational soundness of symbolic analysis for protocols using hash functions (Q2866733) (← links)
- An Equation-Based Classical Logic (Q2947458) (← links)
- Logical Formalisation and Analysis of the Mifare Classic Card in PVS (Q3087992) (← links)
- Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience (Q3100218) (← links)
- How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. (Q3113670) (← links)
- About models of security protocols (Q3165972) (← links)
- Model Checking Security Protocols (Q3176380) (← links)
- Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol (Q3178248) (← links)
- Probabilistic logic over equations and domain restrictions (Q5377701) (← links)
- Theory of Cryptography (Q5711642) (← links)
- Computational Science and Its Applications – ICCSA 2004 (Q5712535) (← links)
- Theory of Cryptography (Q5898365) (← links)
- Formalization and analysis of the post-quantum signature scheme FALCON with Maude (Q6671789) (← links)