A General Composition Theorem for Secure Reactive Systems
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 30 references indexed in Scilit:
- Intransitive non-interference for cryptographic purposesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Polynomial fairness and livenessPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Cryptographically Sound and Machine-Assisted Verification of Security ProtocolsPublished by Springer Nature ,2003
- Computational Probabilistic Non-interferencePublished by Springer Nature ,2002
- The Security of Cipher Block ChainingPublished by Springer Nature ,2001
- Universally composable security: a new paradigm for cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Conjoining specificationsACM Transactions on Programming Languages and Systems, 1995
- Optimal asymmetric encryptionPublished by Springer Nature ,1995
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991