Author of the publication

Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage.

, , , and . Journal of Computer Security, 17 (5): 737-797 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Computationally Complete Symbolic Attacker for Equivalence Properties., and . ACM Conference on Computer and Communications Security, page 609-620. ACM, (2014)Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol., , , , , , , , and . E-Vote-ID, volume 13553 of Lecture Notes in Computer Science, page 19-35. Springer, (2022)A Semantics for "Typically" in First-Order Default Reasoning., and . JSAI-isAI Workshops, volume 12758 of Lecture Notes in Computer Science, page 3-20. Springer, (2020)Computational and Information-Theoretic Soundness and Completeness of Formal Encryption., , and . CSFW, page 170-184. IEEE Computer Society, (2005)Soundness and Completeness of Formal Logics of Symmetric Encryption.. IACR Cryptology ePrint Archive, (2005)Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker., , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 350-372. Springer, (2018)Computational Semantics for Basic Protocol Logic - A Stochastic Approach., , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 86-94. Springer, (2007)Computational Soundness of Formal Indistinguishability and Static Equivalence., , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 182-196. Springer, (2006)Towards Unconditional Soundness: Computationally Complete Symbolic Attacker., and . POST, volume 7215 of Lecture Notes in Computer Science, page 189-208. Springer, (2012)Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols., , and . Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, page 33-56. Springer, (2009)