On the computational soundness of cryptographically masked flows
- 7 January 2008
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 43 (1) , 337-348
- https://doi.org/10.1145/1328438.1328479
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Cryptographically-Masked FlowsPublished by Springer Nature ,2006
- Soundness of Formal Encryption in the Presence of Key-CyclesPublished by Springer Nature ,2005
- A Type System for Computationally Secure Information FlowPublished by Springer Nature ,2005
- Computationally Sound, Automated Proofs for Security ProtocolsPublished by Springer Nature ,2005
- Handling Encryption in an Analysis for Secure Information FlowPublished by Springer Nature ,2003
- Encryption-Scheme Security in the Presence of Key-Dependent MessagesPublished by Springer Nature ,2003
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- Semantics and Program Analysis of Computationally Secure Information FlowPublished by Springer Nature ,2001
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983