Simulation based security in the applied pi calculus
From MaRDI portal
Publication:2920124
DOI10.4230/LIPICS.FSTTCS.2009.2316zbMath1250.94035OpenAlexW1684428352MaRDI QIDQ2920124
Stéphanie Delaune, Steve Kremer, Olivier Pereira
Publication date: 24 October 2012
Full work available at URL: http://subs.emis.de/LIPIcs/frontdoor_2e05.html
Cryptography (94A60) Logic in computer science (03B70) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols ⋮ Automated Verification of Equivalence Properties of Cryptographic Protocols
Uses Software
This page was built for publication: Simulation based security in the applied pi calculus