Automating Computational Proofs for Public-Key-Based Key Exchange
From MaRDI portal
Publication:4933211
DOI10.1007/978-3-642-16280-0_4zbMath1286.94080OpenAlexW1591893114MaRDI QIDQ4933211
No author found.
Publication date: 12 October 2010
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://eprints.qut.edu.au/38763/13/c38763.pdf
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Automated proofs for asymmetric encryption
- Automated Security Proof for Symmetric Encryption Modes
- On the security of public key protocols
- Programming Languages and Systems
- Modular Security Proofs for Key Agreement Protocols
- Errors in Computational Complexity Proofs for Protocols
- Security in Communication Networks
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Automating Computational Proofs for Public-Key-Based Key Exchange