Author of the publication

Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation.

, and . MFCS, volume 2747 of Lecture Notes in Computer Science, page 269-278. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Searching secrets rationally., and . Int. J. Approx. Reason., (2016)On the Expressiveness of Internal Mobility in Name-Passing Calculi.. Theor. Comput. Sci., 195 (2): 205-226 (1998)Algebra, coalgebra, and minimization in polynomial differential equations.. Log. Methods Comput. Sci., (2019)Basic Observables for Processes., , and . Inf. Comput., 149 (1): 77-98 (1999)Approximate Model Counting, Sparse XOR Constraints and Minimum Distance., and . The Art of Modelling Computational Systems, volume 11760 of Lecture Notes in Computer Science, page 363-378. Springer, (2019)Attacking Right-to-Left Modular Exponentiation with Timely Random Faults.. FDTC, volume 4236 of Lecture Notes in Computer Science, page 24-35. Springer, (2006)XPi: A Typed Process Calculus for XML Messaging., and . FMOODS, volume 3535 of Lecture Notes in Computer Science, page 47-66. Springer, (2005)Symbolic Trace Analysis of Cryptographic Protocols.. ICALP, volume 2076 of Lecture Notes in Computer Science, page 667-681. Springer, (2001)Quantitative Information Flow, with a View., , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 588-606. Springer, (2011)Algebra and Coalgebra of Stream Products., and . CONCUR, volume 203 of LIPIcs, page 19:1-19:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)