scientific article; zbMATH DE number 7802077
From MaRDI portal
zbMath1530.94003arXiv2209.10321MaRDI QIDQ6191017
Christopher Lynch, Brandon Rozek, Wei Du, Paliath Narendran, Hai Lin, Veena Ravishankar, Unnamed Author, Catherine A. Meadows, Unnamed Author, Unnamed Author, Andrew M. Marshall
Publication date: 8 February 2024
Full work available at URL: https://arxiv.org/abs/2209.10321
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Software, source code, etc. for problems pertaining to information and communication theory (94-04)
Cites Work
- Unnamed Item
- A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption
- Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystems
- Formal analysis of symbolic authenticity
- Moving the bar on computationally sound exclusive-or
- Characterizing collision and second-preimage resistance in Linicrypt
- Linicrypt: A Model for Practical Cryptography
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
- On the Automatic Analysis of Recursive Security Protocols with XOR
- Term Rewriting and All That
- Mobile values, new names, and secure communication
- Fast Software Encryption
- Automata, Languages and Programming