A composable cryptographic library with nested operations
Top Cited Papers
- 27 October 2003
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 220-230
- https://doi.org/10.1145/948109.948140
Abstract
No abstract availableThis publication has 29 references indexed in Scilit:
- A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key ProtocolPublished by Springer Nature ,2003
- Cryptographic Security of Reactive Systems: (Extended Abstract)Electronic Notes in Theoretical Computer Science, 2000
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978