共 50 条
- [2] Cryptographically sound security proofs for basic and public-key Kerberos International Journal of Information Security, 2011, 10
- [3] A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol FST TCS 2003: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, 2003, 2914 : 1 - 12
- [6] Breaking and fixing public-key Kerberos ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 167 - +
- [7] Public-key encryption in a multi-user setting: Security proofs and improvements ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 259 - 274
- [8] Multi-recipient Public-Key Encryption from Simulators in Security Proofs INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 293 - +
- [9] On the security of a public-key cryptosystem PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 71 - 75