Back to Results
First PageMeta Content
Public-key cryptography / Electronic commerce / Advantage / XTR / Dolev-Yao model / RSA / CMAC / Ciphertext indistinguishability / Universal composability / Cryptography / Cryptographic protocols / Finite fields


Modular Code-Based Cryptographic Verification Cédric Fournet Markulf Kohlweiss Pierre-Yves Strub
Add to Reading List

Document Date: 2011-08-23 11:52:17


Open Document

File Size: 227,59 KB

Share Result on Facebook

City

Chicago / /

Company

Microsoft / /

Country

United States / /

Currency

pence / USD / /

/

Event

Company Expansion / /

Facility

store X / library P / MAC library / /

IndustryTerm

fixed key distribution sub-protocol / communications security / public key protocols / decryption algorithm / verification tools / static verification tool / sample protocol / public network / cryptographic protocols / cryptographic systems / identity-management protocol / sample protocols / cryptographic algorithms / asynchronous systems / communication protocols / computing / type systems / cryptographic type systems / symbolic verification tools / research tools / security protocols / secure software / /

Organization

List.assoc / U.S. Securities and Exchange Commission / UCSD / Congress / Modular Code-Based Cryptographic Verification Cédric Fournet Markulf Kohlweiss Pierre-Yves Strub Microsoft Research Microsoft Research MSR-INRIA Joint Centre / /

Person

Tamara Rezk / Nikhil Swamy / J. H. Morris / Jr. / Ai / Andy Gordon / Avik Chaudhuri / J. C. Mitchell / V / James Margetson / Martín Abadi / Pierre-Yves Strub / /

/

Position

model extractor / hM construction reada reference reader writea reference writer / CPA / /

ProgrammingLanguage

C / ML / C++ / /

ProvinceOrState

Saskatchewan / Illinois / /

PublishedMedium

Cryptology ePrint Archive / IEEE Transactions on Information Theory / /

Technology

three algorithms / MAC algorithms / CPA encryption / fixed protocol / symmetric-key encryptions / symmetric-key encryption / SECRECY USING ENCRYPTION / Universally composable symmetric encryption / fixed key distribution sub-protocol / security protocols / large security protocols / secret key / sample protocols / identity-management protocol / Analyzing security protocols / ElGamal encryption / oracle encryption / encryption / Construction Hybrid encryption / Cryptography / correct encryption / public key / public-key encryption / then hybrid encryption / CPA-secure encryption / concrete encryption / generated protocol / model cryptographic algorithms / sample protocol / RPC protocol / public key protocols / simulation / MAC algorithm / communication protocols / decryption algorithm / digital signature / resulting hybrid encryption / larger existing protocols / /

SocialTag