Cryptographic Analysis in Cubic Time
From MaRDI portal
Publication:2841271
DOI10.1016/S1571-0661(04)00316-0zbMath1268.94029OpenAlexW1974152790WikidataQ59416357 ScholiaQ59416357MaRDI QIDQ2841271
Helmut Seidl, Flemming Nielson, Hanne Riis Nielson
Publication date: 24 July 2013
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s1571-0661(04)00316-0
Related Items
A monotone framework for CCS ⋮ Type Inference for Correspondence Types ⋮ Techniques for Security Checking
Cites Work
- A calculus of mobile processes. II
- A calculus for cryptographic protocols: The spi calculus
- Introduction to set constraint-based program analysis
- Static analysis for the \(\pi\)-calculus with applications to security
- Secrecy by typing in security protocols
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item