Soundness of Formal Encryption in the Presence of Active Adversaries
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 18 references indexed in Scilit:
- Logics for reasoning about cryptographic constructionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Plaintext Awareness via Key RegistrationPublished by Springer Nature ,2003
- Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*Journal of Cryptology, 2002
- Formal Eavesdropping and Its Computational InterpretationPublished by Springer Nature ,2001
- Entity Authentication and Key DistributionPublished by Springer Nature ,2001
- Universally composable security: a new paradigm for cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- Public-Key Encryption in a Multi-user Setting: Security Proofs and ImprovementsPublished by Springer Nature ,2000
- Authenticated Key Exchange Secure against Dictionary AttacksPublished by Springer Nature ,2000
- Strand spaces: proving security protocols correctJournal of Computer Security, 1999
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983