搜索结果: 1-5 共查到“军事学 symbolic security”相关记录5条 . 查询时间(0.14 秒)
Symbolic security of garbled circuits
symbolic cryptography garbled circuit formal methods in cryptography
2018/2/8
We present the first computationally sound symbolic analysis of Yao's garbled circuit construction for secure two party computation. Our results include an extension of the symbolic language for crypt...
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption
Modes of encryption symbolic analysis
2017/11/28
Symbolic methods for reasoning about the security of cryptographic systems have for some time concentrated mainly on protocols. More recently, however, we see a rising interest in the use of symbolic ...
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption
Modes of encryption symbolic analysis
2017/11/28
Symbolic methods for reasoning about the security of cryptographic systems have for some time concentrated mainly on protocols. More recently, however, we see a rising interest in the use of symbolic ...
Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings
Universally Composable Symbolic Analysis Computational Soundness Bilinear Pairings Group Key Exchange Protocol Forward Secrecy
2012/3/26
Canetti and Herzog have proposed a universally composable symbolic analysis (UCSA) of mutual authentication and key exchange protocols within universally composable security framework. It is fully aut...
Pseudo-randomness and partial information in symbolic security analysis
Computational soundness formal methods for security pseudo-random generators
2009/6/15
We prove computational soundness results for cryptographic expressions with pseudo-random keys, as
used, for example, in the design and analysis of secure multicast key distribution protocols. In par...