Adaptive Security of Symbolic Encryption
- 1 January 2005
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Symmetric encryption in a simulatable Dolev-Yao style cryptographic libraryPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Logics for reasoning about cryptographic constructionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Magic FunctionsJournal of the ACM, 2003
- A composable cryptographic library with nested operationsPublished by Association for Computing Machinery (ACM) ,2003
- Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*Journal of Cryptology, 2002
- Formal Eavesdropping and Its Computational InterpretationPublished by Springer Nature ,2001
- Nonmalleable CryptographySIAM Journal on Computing, 2000
- Efficient Communication-Storage Tradeoffs for Multicast EncryptionPublished by Springer Nature ,1999
- Adaptively secure multi-party computationPublished by Association for Computing Machinery (ACM) ,1996
- Probabilistic encryptionJournal of Computer and System Sciences, 1984