Author of the publication

Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries.

, , and . ESOP, volume 3444 of Lecture Notes in Computer Science, page 172-185. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

(De)Compositions of Cryptographic Schemes and their Applications to Protocols., , and . IACR Cryptology ePrint Archive, (2005)The Valmod Project: Historical and Realistic 3D Models for the Touristic Development of the Château de Chambord., , , , and . EuroMed (2), volume 10059 of Lecture Notes in Computer Science, page 53-60. (2016)Automatic pattern recognition on archaeological ceramic by 2D and 3D image analysis: A feasibility study., , , , , , and . IPTA, page 224-228. IEEE, (2015)Preservation and Valorisation of Morocco's Ancient Heritage: Volubilis., , , , , , , , , and 2 other author(s). EuroMed (2), volume 10059 of Lecture Notes in Computer Science, page 160-167. (2016)Automatic Verification of Security Properties Based on Abstractions., , , , , and . VISSAS, volume 1 of NATO Security through Science Series D: Information and Communication Security, page 23-53. IOS Press, (2005)Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries., , and . ESOP, volume 3444 of Lecture Notes in Computer Science, page 172-185. Springer, (2005)Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions., , and . ICS@SYNASC, volume 186 of Electronic Notes in Theoretical Computer Science, page 121-139. Elsevier, (2006)Certifying cryptographic protocols by abstract model-checking and proof concretization., , and . SIGBED Review, 3 (4): 37-57 (2006)