Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions
Analysis and verification of security protocols are typically carried out in two different models of cryptography: formal cryptography and computational cryptography. Formal cryptography, originally inspired by the work of Dolev and Yao [14], takes an abstract and idealized view of security, and d...
Main Author: | Hajiabadi, Mohammad |
---|---|
Other Authors: | Kapron, Bruce |
Format: | Others |
Language: | English en |
Published: |
2011
|
Subjects: | |
Online Access: | http://hdl.handle.net/1828/3496 |
Similar Items
-
New security notions and relations for public-key encryption
by: Sepahi Reza, et al.
Published: (2012-12-01) -
Exploiting Malleable Parallelism on Multicore Systems
by: McFarland, Daniel James
Published: (2014) -
The method of generation program code with indistinguishable functionality
by: Mikhail Andreevich Styugin
Published: (2017-04-01) -
Contextuality and Indistinguishability
by: José Acacio de Barros, et al.
Published: (2017-08-01) -
Formalizing Abstract Computability: Turing Categories in Coq
by: Vinogradova, Polina
Published: (2017)