fixed key distribution sub-protocol / communications security / public key protocols / decryption algorithm / verification tools / static verification tool / sample protocol / public network / cryptographic protocols / cryptographic systems / identity-management protocol / sample protocols / cryptographic algorithms / asynchronous systems / communication protocols / computing / type systems / cryptographic type systems / symbolic verification tools / research tools / security protocols / secure software / /
Organization
List.assoc / U.S. Securities and Exchange Commission / UCSD / Congress / Modular Code-Based Cryptographic Verification Cédric Fournet Markulf Kohlweiss Pierre-Yves Strub Microsoft Research Microsoft Research MSR-INRIA Joint Centre / /
Person
Tamara Rezk / Nikhil Swamy / J. H. Morris / Jr. / Ai / Andy Gordon / Avik Chaudhuri / J. C. Mitchell / V / James Margetson / Martín Abadi / Pierre-Yves Strub / / /
Position
model extractor / hM construction reada reference reader writea reference writer / CPA / /
ProgrammingLanguage
C / ML / C++ / /
ProvinceOrState
Saskatchewan / Illinois / /
PublishedMedium
Cryptology ePrint Archive / IEEE Transactions on Information Theory / /
Technology
three algorithms / MAC algorithms / CPA encryption / fixed protocol / symmetric-key encryptions / symmetric-key encryption / SECRECY USING ENCRYPTION / Universally composable symmetric encryption / fixed key distribution sub-protocol / security protocols / large security protocols / secret key / sample protocols / identity-management protocol / Analyzing security protocols / ElGamal encryption / oracle encryption / encryption / Construction Hybrid encryption / Cryptography / correct encryption / public key / public-key encryption / then hybrid encryption / CPA-secure encryption / concrete encryption / generated protocol / model cryptographic algorithms / sample protocol / RPC protocol / public key protocols / simulation / MAC algorithm / communication protocols / decryption algorithm / digital signature / resulting hybrid encryption / larger existing protocols / /