Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Computationally sound symbolic secrecy in the presence of hash functions

Identifieur interne : 000382 ( PascalFrancis/Corpus ); précédent : 000381; suivant : 000383

Computationally sound symbolic secrecy in the presence of hash functions

Auteurs : Véronique Cortier ; Steve Kremer ; Ralf Kusters ; Bogdan Warinschi

Source :

RBID : Pascal:07-0531787

Descripteurs français

English descriptors

Abstract

The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.

Notice en format standard (ISO 2709)

Pour connaître la documentation sur le format Inist Standard.

pA  
A01 01  1    @0 0302-9743
A05       @2 4337
A08 01  1  ENG  @1 Computationally sound symbolic secrecy in the presence of hash functions
A09 01  1  ENG  @1 FSTTCS 2006 : foundations of software technology and theoretical computer science : 26th International conference, Kolkata, India, December 13-15, 2006 : proceedings
A11 01  1    @1 CORTIER (Véronique)
A11 02  1    @1 KREMER (Steve)
A11 03  1    @1 KUSTERS (Ralf)
A11 04  1    @1 WARINSCHI (Bogdan)
A12 01  1    @1 ARUN-KUMAR (S.) @9 ed.
A12 02  1    @1 GARG (Naveen) @9 ed.
A14 01      @1 Loria, CNRS & INRIA project Cassis @3 FRA @Z 1 aut.
A14 02      @1 LSV, CNRS & ENS Cachan & INRIA project Secsi @3 FRA @Z 2 aut.
A14 03      @1 ETH Zurich @3 CHE @Z 3 aut.
A14 04      @1 Loria, Univerité Henri Poincaré & INRIA project Cassis @3 FRA @Z 4 aut.
A20       @1 176-187
A21       @1 2006
A23 01      @0 ENG
A26 01      @0 3-540-49994-6
A43 01      @1 INIST @2 16343 @5 354000172801410180
A44       @0 0000 @1 © 2007 INIST-CNRS. All rights reserved.
A45       @0 16 ref.
A47 01  1    @0 07-0531787
A60       @1 P @2 C
A61       @0 A
A64 01  1    @0 Lecture notes in computer science
A66 01      @0 DEU
C01 01    ENG  @0 The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.
C02 01  X    @0 001D02B07C
C02 02  X    @0 001D02A05
C03 01  X  FRE  @0 Informatique théorique @5 01
C03 01  X  ENG  @0 Computer theory @5 01
C03 01  X  SPA  @0 Informática teórica @5 01
C03 02  X  FRE  @0 Hachage @5 06
C03 02  X  ENG  @0 Hashing @5 06
C03 02  X  SPA  @0 Hashing @5 06
C03 03  X  FRE  @0 Cryptographie @5 07
C03 03  X  ENG  @0 Cryptography @5 07
C03 03  X  SPA  @0 Criptografía @5 07
C03 04  X  FRE  @0 Protocole transmission @5 08
C03 04  X  ENG  @0 Transmission protocol @5 08
C03 04  X  SPA  @0 Protocolo transmisión @5 08
C03 05  X  FRE  @0 Sécurité @5 09
C03 05  X  ENG  @0 Safety @5 09
C03 05  X  SPA  @0 Seguridad @5 09
C03 06  X  FRE  @0 Décidabilité @5 10
C03 06  X  ENG  @0 Decidability @5 10
C03 06  X  SPA  @0 Decidibilidad @5 10
C03 07  X  FRE  @0 Prise décision @5 11
C03 07  X  ENG  @0 Decision making @5 11
C03 07  X  SPA  @0 Toma decision @5 11
C03 08  X  FRE  @0 Cryptage @5 12
C03 08  X  ENG  @0 Encryption @5 12
C03 08  X  SPA  @0 Cifrado @5 12
C03 09  X  FRE  @0 Secret @5 18
C03 09  X  ENG  @0 Secrecy @5 18
C03 09  X  SPA  @0 Secreto @5 18
C03 10  X  FRE  @0 Clé publique @5 19
C03 10  X  ENG  @0 Public key @5 19
C03 10  X  SPA  @0 Llave pública @5 19
C03 11  X  FRE  @0 Oracle @5 20
C03 11  X  ENG  @0 Oracle @5 20
C03 12  X  FRE  @0 Fonction aléatoire @5 23
C03 12  X  ENG  @0 Random function @5 23
C03 12  X  SPA  @0 Función aleatoria @5 23
C03 13  X  FRE  @0 Modélisation @5 24
C03 13  X  ENG  @0 Modeling @5 24
C03 13  X  SPA  @0 Modelización @5 24
N21       @1 344
N44 01      @1 OTO
N82       @1 OTO
pR  
A30 01  1  ENG  @1 International Conference on the Foundations of Software Technology and Theoretical Computer Science @2 26 @3 Kolkata IND @4 2006

Format Inist (serveur)

NO : PASCAL 07-0531787 INIST
ET : Computationally sound symbolic secrecy in the presence of hash functions
AU : CORTIER (Véronique); KREMER (Steve); KUSTERS (Ralf); WARINSCHI (Bogdan); ARUN-KUMAR (S.); GARG (Naveen)
AF : Loria, CNRS & INRIA project Cassis/France (1 aut.); LSV, CNRS & ENS Cachan & INRIA project Secsi/France (2 aut.); ETH Zurich/Suisse (3 aut.); Loria, Univerité Henri Poincaré & INRIA project Cassis/France (4 aut.)
DT : Publication en série; Congrès; Niveau analytique
SO : Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2006; Vol. 4337; Pp. 176-187; Bibl. 16 ref.
LA : Anglais
EA : The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.
CC : 001D02B07C; 001D02A05
FD : Informatique théorique; Hachage; Cryptographie; Protocole transmission; Sécurité; Décidabilité; Prise décision; Cryptage; Secret; Clé publique; Oracle; Fonction aléatoire; Modélisation
ED : Computer theory; Hashing; Cryptography; Transmission protocol; Safety; Decidability; Decision making; Encryption; Secrecy; Public key; Oracle; Random function; Modeling
SD : Informática teórica; Hashing; Criptografía; Protocolo transmisión; Seguridad; Decidibilidad; Toma decision; Cifrado; Secreto; Llave pública; Función aleatoria; Modelización
LO : INIST-16343.354000172801410180
ID : 07-0531787

Links to Exploration step

Pascal:07-0531787

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">Computationally sound symbolic secrecy in the presence of hash functions</title>
<author>
<name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation>
<inist:fA14 i1="01">
<s1>Loria, CNRS & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Kremer, Steve" sort="Kremer, Steve" uniqKey="Kremer S" first="Steve" last="Kremer">Steve Kremer</name>
<affiliation>
<inist:fA14 i1="02">
<s1>LSV, CNRS & ENS Cachan & INRIA project Secsi</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Kusters, Ralf" sort="Kusters, Ralf" uniqKey="Kusters R" first="Ralf" last="Kusters">Ralf Kusters</name>
<affiliation>
<inist:fA14 i1="03">
<s1>ETH Zurich</s1>
<s3>CHE</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Warinschi, Bogdan" sort="Warinschi, Bogdan" uniqKey="Warinschi B" first="Bogdan" last="Warinschi">Bogdan Warinschi</name>
<affiliation>
<inist:fA14 i1="04">
<s1>Loria, Univerité Henri Poincaré & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">07-0531787</idno>
<date when="2006">2006</date>
<idno type="stanalyst">PASCAL 07-0531787 INIST</idno>
<idno type="RBID">Pascal:07-0531787</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000382</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">Computationally sound symbolic secrecy in the presence of hash functions</title>
<author>
<name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<affiliation>
<inist:fA14 i1="01">
<s1>Loria, CNRS & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Kremer, Steve" sort="Kremer, Steve" uniqKey="Kremer S" first="Steve" last="Kremer">Steve Kremer</name>
<affiliation>
<inist:fA14 i1="02">
<s1>LSV, CNRS & ENS Cachan & INRIA project Secsi</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Kusters, Ralf" sort="Kusters, Ralf" uniqKey="Kusters R" first="Ralf" last="Kusters">Ralf Kusters</name>
<affiliation>
<inist:fA14 i1="03">
<s1>ETH Zurich</s1>
<s3>CHE</s3>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Warinschi, Bogdan" sort="Warinschi, Bogdan" uniqKey="Warinschi B" first="Bogdan" last="Warinschi">Bogdan Warinschi</name>
<affiliation>
<inist:fA14 i1="04">
<s1>Loria, Univerité Henri Poincaré & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
<imprint>
<date when="2006">2006</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Computer theory</term>
<term>Cryptography</term>
<term>Decidability</term>
<term>Decision making</term>
<term>Encryption</term>
<term>Hashing</term>
<term>Modeling</term>
<term>Oracle</term>
<term>Public key</term>
<term>Random function</term>
<term>Safety</term>
<term>Secrecy</term>
<term>Transmission protocol</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Informatique théorique</term>
<term>Hachage</term>
<term>Cryptographie</term>
<term>Protocole transmission</term>
<term>Sécurité</term>
<term>Décidabilité</term>
<term>Prise décision</term>
<term>Cryptage</term>
<term>Secret</term>
<term>Clé publique</term>
<term>Oracle</term>
<term>Fonction aléatoire</term>
<term>Modélisation</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0302-9743</s0>
</fA01>
<fA05>
<s2>4337</s2>
</fA05>
<fA08 i1="01" i2="1" l="ENG">
<s1>Computationally sound symbolic secrecy in the presence of hash functions</s1>
</fA08>
<fA09 i1="01" i2="1" l="ENG">
<s1>FSTTCS 2006 : foundations of software technology and theoretical computer science : 26th International conference, Kolkata, India, December 13-15, 2006 : proceedings</s1>
</fA09>
<fA11 i1="01" i2="1">
<s1>CORTIER (Véronique)</s1>
</fA11>
<fA11 i1="02" i2="1">
<s1>KREMER (Steve)</s1>
</fA11>
<fA11 i1="03" i2="1">
<s1>KUSTERS (Ralf)</s1>
</fA11>
<fA11 i1="04" i2="1">
<s1>WARINSCHI (Bogdan)</s1>
</fA11>
<fA12 i1="01" i2="1">
<s1>ARUN-KUMAR (S.)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="02" i2="1">
<s1>GARG (Naveen)</s1>
<s9>ed.</s9>
</fA12>
<fA14 i1="01">
<s1>Loria, CNRS & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</fA14>
<fA14 i1="02">
<s1>LSV, CNRS & ENS Cachan & INRIA project Secsi</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA14 i1="03">
<s1>ETH Zurich</s1>
<s3>CHE</s3>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="04">
<s1>Loria, Univerité Henri Poincaré & INRIA project Cassis</s1>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
</fA14>
<fA20>
<s1>176-187</s1>
</fA20>
<fA21>
<s1>2006</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA26 i1="01">
<s0>3-540-49994-6</s0>
</fA26>
<fA43 i1="01">
<s1>INIST</s1>
<s2>16343</s2>
<s5>354000172801410180</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 2007 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>16 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>07-0531787</s0>
</fA47>
<fA60>
<s1>P</s1>
<s2>C</s2>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i1="01" i2="1">
<s0>Lecture notes in computer science</s0>
</fA64>
<fA66 i1="01">
<s0>DEU</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.</s0>
</fC01>
<fC02 i1="01" i2="X">
<s0>001D02B07C</s0>
</fC02>
<fC02 i1="02" i2="X">
<s0>001D02A05</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE">
<s0>Informatique théorique</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG">
<s0>Computer theory</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA">
<s0>Informática teórica</s0>
<s5>01</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE">
<s0>Hachage</s0>
<s5>06</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG">
<s0>Hashing</s0>
<s5>06</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA">
<s0>Hashing</s0>
<s5>06</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE">
<s0>Cryptographie</s0>
<s5>07</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG">
<s0>Cryptography</s0>
<s5>07</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA">
<s0>Criptografía</s0>
<s5>07</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE">
<s0>Protocole transmission</s0>
<s5>08</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG">
<s0>Transmission protocol</s0>
<s5>08</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA">
<s0>Protocolo transmisión</s0>
<s5>08</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE">
<s0>Sécurité</s0>
<s5>09</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG">
<s0>Safety</s0>
<s5>09</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA">
<s0>Seguridad</s0>
<s5>09</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE">
<s0>Décidabilité</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG">
<s0>Decidability</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA">
<s0>Decidibilidad</s0>
<s5>10</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE">
<s0>Prise décision</s0>
<s5>11</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG">
<s0>Decision making</s0>
<s5>11</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA">
<s0>Toma decision</s0>
<s5>11</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE">
<s0>Cryptage</s0>
<s5>12</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG">
<s0>Encryption</s0>
<s5>12</s5>
</fC03>
<fC03 i1="08" i2="X" l="SPA">
<s0>Cifrado</s0>
<s5>12</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE">
<s0>Secret</s0>
<s5>18</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG">
<s0>Secrecy</s0>
<s5>18</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA">
<s0>Secreto</s0>
<s5>18</s5>
</fC03>
<fC03 i1="10" i2="X" l="FRE">
<s0>Clé publique</s0>
<s5>19</s5>
</fC03>
<fC03 i1="10" i2="X" l="ENG">
<s0>Public key</s0>
<s5>19</s5>
</fC03>
<fC03 i1="10" i2="X" l="SPA">
<s0>Llave pública</s0>
<s5>19</s5>
</fC03>
<fC03 i1="11" i2="X" l="FRE">
<s0>Oracle</s0>
<s5>20</s5>
</fC03>
<fC03 i1="11" i2="X" l="ENG">
<s0>Oracle</s0>
<s5>20</s5>
</fC03>
<fC03 i1="12" i2="X" l="FRE">
<s0>Fonction aléatoire</s0>
<s5>23</s5>
</fC03>
<fC03 i1="12" i2="X" l="ENG">
<s0>Random function</s0>
<s5>23</s5>
</fC03>
<fC03 i1="12" i2="X" l="SPA">
<s0>Función aleatoria</s0>
<s5>23</s5>
</fC03>
<fC03 i1="13" i2="X" l="FRE">
<s0>Modélisation</s0>
<s5>24</s5>
</fC03>
<fC03 i1="13" i2="X" l="ENG">
<s0>Modeling</s0>
<s5>24</s5>
</fC03>
<fC03 i1="13" i2="X" l="SPA">
<s0>Modelización</s0>
<s5>24</s5>
</fC03>
<fN21>
<s1>344</s1>
</fN21>
<fN44 i1="01">
<s1>OTO</s1>
</fN44>
<fN82>
<s1>OTO</s1>
</fN82>
</pA>
<pR>
<fA30 i1="01" i2="1" l="ENG">
<s1>International Conference on the Foundations of Software Technology and Theoretical Computer Science</s1>
<s2>26</s2>
<s3>Kolkata IND</s3>
<s4>2006</s4>
</fA30>
</pR>
</standard>
<server>
<NO>PASCAL 07-0531787 INIST</NO>
<ET>Computationally sound symbolic secrecy in the presence of hash functions</ET>
<AU>CORTIER (Véronique); KREMER (Steve); KUSTERS (Ralf); WARINSCHI (Bogdan); ARUN-KUMAR (S.); GARG (Naveen)</AU>
<AF>Loria, CNRS & INRIA project Cassis/France (1 aut.); LSV, CNRS & ENS Cachan & INRIA project Secsi/France (2 aut.); ETH Zurich/Suisse (3 aut.); Loria, Univerité Henri Poincaré & INRIA project Cassis/France (4 aut.)</AF>
<DT>Publication en série; Congrès; Niveau analytique</DT>
<SO>Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2006; Vol. 4337; Pp. 176-187; Bibl. 16 ref.</SO>
<LA>Anglais</LA>
<EA>The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.</EA>
<CC>001D02B07C; 001D02A05</CC>
<FD>Informatique théorique; Hachage; Cryptographie; Protocole transmission; Sécurité; Décidabilité; Prise décision; Cryptage; Secret; Clé publique; Oracle; Fonction aléatoire; Modélisation</FD>
<ED>Computer theory; Hashing; Cryptography; Transmission protocol; Safety; Decidability; Decision making; Encryption; Secrecy; Public key; Oracle; Random function; Modeling</ED>
<SD>Informática teórica; Hashing; Criptografía; Protocolo transmisión; Seguridad; Decidibilidad; Toma decision; Cifrado; Secreto; Llave pública; Función aleatoria; Modelización</SD>
<LO>INIST-16343.354000172801410180</LO>
<ID>07-0531787</ID>
</server>
</inist>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000382 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000382 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    PascalFrancis
   |étape=   Corpus
   |type=    RBID
   |clé=     Pascal:07-0531787
   |texte=   Computationally sound symbolic secrecy in the presence of hash functions
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022