共 50 条
- [1] Completing the picture:: Soundness of formal encryption in the presence of active adversaries [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 172 - 185
- [2] Soundness of digital signature in the presence of active adversaries [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1352 - +
- [3] Soundness of formal encryption in the presence of key-cycles [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 374 - 396
- [4] Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 29 - +
- [6] On the Soundness of Infrastructure Adversaries [J]. 2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 345 - 360
- [7] Computational and information-theoretic soundness and completeness of formal encryption [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 170 - 184
- [8] Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* [J]. Journal of Cryptology, 2002, 15 : 103 - 127