Cryptographic Security of Reactive Systems: (Extended Abstract)
Open Access
- 31 December 2000
- journal article
- Published by Elsevier BV in Electronic Notes in Theoretical Computer Science
- Vol. 32, 59-77
- https://doi.org/10.1016/s1571-0661(04)00095-7
Abstract
No abstract availableKeywords
This publication has 33 references indexed in Scilit:
- Incoercible multiparty computationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)Lecture Notes in Computer Science, 1999
- A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)Published by Association for Computing Machinery (ACM) ,1998
- Protection in programming-language translationsLecture Notes in Computer Science, 1998
- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attackPublished by Springer Science and Business Media LLC ,1998
- Relations among notions of security for public-key encryption schemesPublished by Springer Science and Business Media LLC ,1998
- A calculus for cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1997
- A semantics for a logic of authentication (extended abstract)Published by Association for Computing Machinery (ACM) ,1991
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- How to generate cryptographically strong sequences of pseudo random bitsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982