Secure Composition of Cryptographic Protocols
From MaRDI portal
Publication:3092344
DOI10.1007/978-3-642-24316-5_2zbMATH Open1298.94088OpenAlexW2133257851MaRDI QIDQ3092344
Publication date: 16 September 2011
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-24316-5_2
Related Items (7)
Title not available (Why is that?) ⋮ Resource fairness and composability of cryptographic protocols ⋮ Techniques for Efficient Secure Computation Based on Yao’s Protocol ⋮ Composition Implies Adaptive Security in Minicrypt ⋮ Probabilistic Termination and Composability of Cryptographic Protocols ⋮ Deciding the security of protocols with commuting public key encryption ⋮ Title not available (Why is that?)
This page was built for publication: Secure Composition of Cryptographic Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3092344)