Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Steve Kremer And NotFranche-Comté

List of bibliographic references

Number of relevant bibliographic references: 9.
Ident.Authors (with country if any)Title
000057 Steve Kremer [France] ; Peter R Nne [France]To Du or not to Du: A Security Analysis of Du-Vote
001454 Steve Kremer [France] ; Robert Künnemann [France] ; Graham Steel [France]Universally Composable Key-Management
001C92 Stefan Ciobaca [France] ; Stéphanie Delaune [France] ; Steve Kremer [France]Computing knowledge in security protocols under convergent equational theories
001F62 Céline Chevalier [France] ; Stéphanie Delaune [France] ; Steve Kremer [France]Transforming Password Protocols to Compose
003127 Véronique Cortier [France] ; Steve Kremer [France] ; Bogdan Warinschi [Royaume-Uni]A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
003B86 Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France]Computationally sound implementations of equational theories against passive adversaries
005616 Véronique Cortier [France] ; Steve Kremer [France] ; Ralf Kusters [Suisse] ; Bogdan Warinschi [France]Computationally sound symbolic secrecy in the presence of hash functions
005E94 Mathieu Baudet ; Véronique Cortier ; Steve KremerComputationally Sound Implementations of Equational Theories against Passive Adversaries
006280 Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France]Computationally Sound Implementations of Equational Theories Against Passive Adversaries

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022