Theory of Cryptography

From MaRDI portal
Publication:5898365

DOI10.1007/11681878zbMath1112.94025OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898365

Ran Canetti, Jonathan Herzog

Publication date: 12 February 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11681878




Related Items (20)

Modular verification of protocol equivalence in the presence of randomnessReconciling non-malleability with homomorphic encryption(Public) verifiability for composable protocols without adaptivity or zero-knowledgeThe IITM model: a simple and expressive model for universal composabilityJoint state composition theorems for public-key encryption and digital signature functionalities with local computationThe reactive simulatability (RSIM) framework for asynchronous systemsComputationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairingsA survey of symbolic methods in computational analysis of cryptographic systemsAutomating Computational Proofs for Public-Key-Based Key ExchangeOAEP Is Secure under Key-Dependent MessagesCryptographic Protocol Composition via the Authentication TestsOn Simulatability Soundness and Mapping Soundness of Symbolic CryptographyComputationally sound implementations of equational theories against passive adversariesComputational Semantics for First-Order Logical Analysis of Cryptographic ProtocolsComputationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal SetupsUniversally Composable Security Analysis of TLSCryptographically Sound Security Proofs for Basic and Public-Key KerberosLimits of the BRSIM/UC Soundness of Dolev-Yao Models with HashesLimits of the Cryptographic Realization of Dolev-Yao-Style XORSoundness of Formal Encryption in the Presence of Key-Cycles


Uses Software



This page was built for publication: Theory of Cryptography