Encryption-Scheme Security in the Presence of Key-Dependent Messages
Top Cited Papers
- 17 February 2003
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- A concrete security treatment of symmetric encryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Cryptographic Security of Reactive Systems: (Extended Abstract)Electronic Notes in Theoretical Computer Science, 2000
- Composition and integrity preservation of secure reactive systemsPublished by Association for Computing Machinery (ACM) ,2000
- Reconciling Two Views of CryptographyPublished by Springer Nature ,2000
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- The inductive approach to verifying cryptographic protocolsJournal of Computer Security, 1998
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983