On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
From MaRDI portal
Publication:5458826
DOI10.1007/978-3-540-77050-3_9zbMath1135.94325OpenAlexW1492593877MaRDI QIDQ5458826
Michael Backes, Ralf Küsters, Markus Dürmuth
Publication date: 24 April 2008
Published in: FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77050-3_9
Related Items
A survey of symbolic methods in computational analysis of cryptographic systems, Ideal Key Derivation and Encryption in Simulation-Based Security, On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Cites Work
- Unnamed Item
- Unnamed Item
- An NP decision procedure for protocol insecurity with XOR
- The reactive simulatability (RSIM) framework for asynchronous systems
- On the security of public key protocols
- Symmetric Authentication within a Simulatable Cryptographic Library
- Programming Languages and Systems
- Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
- On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
- Theory of Cryptography
- Theory of Cryptography