Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Constructive Cryptography – A New Paradigm for Security Definitions and Proofs - MaRDI portal

Constructive Cryptography – A New Paradigm for Security Definitions and Proofs

From MaRDI portal
Publication:2902914

DOI10.1007/978-3-642-27375-9_3zbMath1378.94055OpenAlexW1805451635MaRDI QIDQ2902914

Ueli M. Maurer

Publication date: 22 August 2012

Published in: Theory of Security and Applications (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-27375-9_3




Related Items (35)

MoSS: modular security specifications frameworkShort variable length domain extenders with beyond birthday bound securityComposition with knowledge assumptionsFrom Indifferentiability to Constructive Cryptography (and Back)Simultaneous Secrecy and Reliability Amplification for a General Channel ModelVirtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic AgentsRobust Authenticated Encryption and the Limits of Symmetric CryptographyCryptHOL: game-based proofs in higher-order logicComposable and finite computational security of quantum message transmissionA unified and composable take on ratchetingUniversally Composable Firewall Architectures Using Trusted HardwareQuery-Complexity Amplification for Random OraclesWitness-succinct universally-composable SNARKsUniversal Composition with Responsive EnvironmentsA more complete analysis of the signal double ratchet algorithmAnonymous authenticated communicationIdentity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBEGiving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)Efficient proofs of retrievability using expander codesUniversal reductions: reductions relative to stateful oraclesCategorical composable cryptography: extended versionCategorical composable cryptographySecurity limitations of classical-client delegated quantum computingAdaptive security of multi-party protocols, revisitedThe IITM model: a simple and expressive model for universal composabilityState separation for code-based game-playing proofsRIV for Robust Authenticated EncryptionClassical leakage resilience from fault-tolerant quantum computationToward an algebraic theory of systemsSimplified Universal Composability FrameworkTARDIS: a foundation of time-lock puzzles in UCRevisiting (R)CCA security and replay protectionMemory Erasability AmplificationOvercoming impossibility results in composable security using interval-wise guaranteesQuantum Authentication with Key Recycling




This page was built for publication: Constructive Cryptography – A New Paradigm for Security Definitions and Proofs