Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Theory of Cryptography - MaRDI portal

Theory of Cryptography

From MaRDI portal
Publication:5901780

DOI10.1007/b95566zbMath1197.94173OpenAlexW2498336418MaRDI QIDQ5901780

Michael Backes, Michael Waidner, Birgit Pfitzmann

Publication date: 14 May 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b95566




Related Items

MoSS: modular security specifications frameworkA probabilistic polynomial-time process calculus for the analysis of cryptographic protocolsShort variable length domain extenders with beyond birthday bound securityFrom Indifferentiability to Constructive Cryptography (and Back)Switched PIOA: parallel composition via distributed schedulingPolynomial runtime and composabilityComposable and finite computational security of quantum message transmissionCompact and Efficient UC Commitments Under Atomic-ExchangesUniversally Composable Firewall Architectures Using Trusted HardwareCategorical composable cryptography: extended versionCategorical composable cryptographyState separation for code-based game-playing proofsResource fairness and composability of cryptographic protocolsThe reactive simulatability (RSIM) framework for asynchronous systemsOn the (im-)possibility of extending coin tossUnifying simulatability definitions in cryptographic systems under different timing assumptionsOn the (Im-)Possibility of Extending Coin TossThe Layered Games Framework for Specifications and Analysis of Security ProtocolsGNUC: a new universal composability frameworkAnalyzing security protocols using time-bounded task-PIOAsOn the relationships between notions of simulation-based securityThreshold Homomorphic Encryption in the Universally Composable Cryptographic LibraryConditional Reactive SimulatabilityQuantifying Probabilistic Information Flow in Computational Reactive SystemsSoundness of Formal Encryption in the Presence of Key-Cycles