Unification modulo homomorphic encryption
From MaRDI portal
Publication:437037
DOI10.1007/s10817-010-9205-yzbMath1242.68096OpenAlexW2622023179WikidataQ118190402 ScholiaQ118190402MaRDI QIDQ437037
Hai Lin, Christopher Lynch, Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch
Publication date: 17 July 2012
Published in: Journal of Automated Reasoning (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10817-010-9205-y
Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).
Related Items (3)
Local XOR unification: definitions, algorithms and application to cryptography ⋮ Unification modulo homomorphic encryption ⋮ Bounded ACh unification
Cites Work
- Unification modulo homomorphic encryption
- Intruder deduction for the equational theory of abelian groups with distributive encryption
- Unification problems with one-sided distributivity
- Unification Modulo Homomorphic Encryption
- On the unification problem for Cartesian closed categories
- Term Rewriting and All That
- Verification: Theory and Practice
- The complexity of satisfiability problems
- Intruders with Caps
This page was built for publication: Unification modulo homomorphic encryption