Found 587 Documents (Results 1–100)
Knowledge problems in security protocols: going beyond subterm convergent theories. (English) Zbl 07929345
Gaboardi, Marco (ed.) et al., 8th international conference on formal structures for computation and deduction, FSCD 2023, Rome, Italy, July 3–6, 2023. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 260, Article 30, 19 p. (2023).
Describing and animating quantum protocols. (English) Zbl 07920685
Palmigiano, Alessandra (ed.) et al., Samson Abramsky on logic and structure in computer science and beyond. Cham: Springer. Outst. Contrib. Log. 25, 447-473 (2023).
Three party secure computation with friends and foes. (English) Zbl 07891014
Rothblum, Guy (ed.) et al., Theory of cryptography. 21st international conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14370, 156-185 (2023).
Universally composable auditable surveillance. (English) Zbl 1543.94726
Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14439, 453-487 (2023).
Best of both worlds. Revisiting the spymasters double agent problem. (English) Zbl 1531.94021
Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 328-359 (2023).
High performance, low energy, and trustworthy blockchains using satellites. (English) Zbl 07780439
MSC:
68M12
Game-theoretically secure protocols for the ordinal random assignment problem. (English) Zbl 1542.94113
Tibouchi, Mehdi (ed.) et al., Applied cryptography and network security. 21st international conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13906, 582-610 (2023).
An enhanced anonymous ECC-based authentication for lightweight application in TMIS. (English) Zbl 1522.94104
El Hajji, Said (ed.) et al., Codes, cryptology and information security. 4th international conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13874, 290-320 (2023).
An efficient canonical narrowing implementation with irreducibility and SMT constraints for generic symbolic protocol analysis. (English) Zbl 07741961
MSC:
68-XX
State machine replication under changing network conditions. (English) Zbl 1524.68010
Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 681-710 (2023).
Gaining trust by tracing security protocols. (English) Zbl 07618128
MSC:
68-XX
Static vs. adaptive security in perfect MPC: a separation and the adaptive security of BGW. (English) Zbl 1542.94100
Dachman-Soled, Dana (ed.), 3rd conference on information-theoretic cryptography, ITC 2022, Cambridge, MA, USA, July 5–7, 2022. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 230, Article 15, 16 p. (2022).
Augmented random oracles. (English) Zbl 1517.94168
Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 35-65 (2022).
MSC:
94A60
Formalizing delayed adaptive corruptions and the security of flooding networks. (English) Zbl 1515.68087
Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 400-430 (2022).
Invited paper: Cross-chain state machine replication. (English) Zbl 1522.68072
Devismes, Stéphane (ed.) et al., Stabilization, safety, and security of distributed systems. 24th international symposium, SSS 2022, Clermont-Ferrand, France, November 15–17, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13751, 51-65 (2022).
Cryptography and network security. (English) Zbl 1510.68003
River Publishers Series in Security and Digital Forensics. Gistrup: River Publishers; London: Routledge (ISBN 978-87-7022-407-9/hbk; 978-1-003-33776-8/ebook). xiii, 293 p. (2022).
Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies. (English) Zbl 1505.93002
Canonical narrowing with irreducibility and SMT constraints as a generic symbolic protocol analysis method. (English) Zbl 1517.94128
Bae, Kyungmin (ed.), Rewriting logic and its applications. 14th international workshop, WRLA 2022, Munich, Germany, April 2–3, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13252, 45-64 (2022).
ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability. (English) Zbl 07628044
Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 71-91 (2022).
Dispelling myths on superposition attacks: formal security model and attack analyses. (English) Zbl 1485.94111
Des. Codes Cryptography 90, No. 4, 881-920 (2022); correction ibid. 90, No. 6, 1535 (2022).
Computer networks. A systems approach. 6th edition. (English) Zbl 1473.68007
Amsterdam: Elsevier/Morgan Kaufmann (ISBN 978-0-12-818200-0/pbk; 978-0-12-818201-7/ebook). xxvi, 817 p. (2022).
Reviewer: Józef Woźniak (Gdańsk)
Boosting the security of blind signature schemes. (English) Zbl 1514.94153
Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13093, 468-492 (2021).
The cost of adaptivity in security games on graphs. (English) Zbl 1511.94115
Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 550-581 (2021).
Efficient perfectly secure computation with optimal resilience. (English) Zbl 1511.94036
Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 66-96 (2021).
MSC:
94A60
Environmentally friendly composable multi-party computation in the plain model from standard (timed) assumptions. (English) Zbl 1509.94072
Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13042, 750-781 (2021).
On orderings in security models. (English) Zbl 1498.68057
Dougherty, Daniel (ed.) et al., Protocols, strands, and logic. Essays dedicated to Joshua Guttman on the occasion of his 66.66th birthday. Cham: Springer. Lect. Notes Comput. Sci. 13066, 370-393 (2021).
Security protocols as choreographies. (English) Zbl 1499.94036
Dougherty, Daniel (ed.) et al., Protocols, strands, and logic. Essays dedicated to Joshua Guttman on the occasion of his 66.66th birthday. Cham: Springer. Lect. Notes Comput. Sci. 13066, 98-111 (2021).
Attestation waves: platform trust via remote power analysis. (English) Zbl 1498.68052
Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 460-482 (2021).
Issuer-hiding attribute-based credentials. (English) Zbl 1493.94028
Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 158-178 (2021).
MoSS: modular security specifications framework. (English) Zbl 1486.94107
Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 33-63 (2021).
MSC:
94A60
On the round complexity of black-box secure MPC. (English) Zbl 1486.94111
Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 214-243 (2021).
Impact of randomization in VKO mechanisms on overall security level. (Russian. English summary) Zbl 1486.94077
Formalizing and analyzing security ceremonies with heterogeneous devices in ANP and PDL. (English) Zbl 1528.68049
On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments. (English) Zbl 1470.94082
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. (English) Zbl 1469.94090
A decidable class of security protocols for both reachability and equivalence properties. (English) Zbl 1543.68199
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. (English) Zbl 1508.68098
Distributed fusion estimation for non-linear networked systems with random access protocol and cyber attacks. (English) Zbl 1542.93384
Stability-guaranteed dynamic ElGamal cryptosystem for encrypted control systems. (English) Zbl 1542.93312
Dispelling myths on superposition attacks: formal security model and attack analyses. (English) Zbl 1511.94143
Nguyen, Khoa (ed.) et al., Provable and practical security. 14th international conference, ProvSec 2020, Singapore, November 29 – December 1, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12505, 318-337 (2020).
Foundations for actively secure card-based cryptography. (English) Zbl 1516.94038
Farach-Colton, Martin (ed.) et al., 10th international conference on fun with algorithms. FUN 2021, May 30 – June 1, 2021, Favignana Island, Sicily, Italy. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 157, Article 17, 23 p. (2020).
Verification of security protocols (invited talk). (English) Zbl 07650814
Fernández, Maribel (ed.) et al., 28th EACSL annual conference on computer science logic, CSL 2020, Barcelona, Spain, January 13–16, 2020. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 152, Article 1, 2 p. (2020).
Pine: enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment. (English) Zbl 1524.68044
Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 3-22 (2020).
A symbolic model for systematically analyzing TEE-based protocols. (English) Zbl 1511.68049
Meng, Weizhi (ed.) et al., Information and communications security. 22nd international conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12282, 126-144 (2020).
On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs. (English) Zbl 1506.94034
Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 670-690 (2020).
Private set intersection in the internet setting from lightweight oblivious PRF. (English) Zbl 1504.94118
Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 34-63 (2020).
Reverse firewalls for actively secure MPCs. (English) Zbl 1504.94117
Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12171, 732-762 (2020).
Decidable inductive invariants for verification of cryptographic protocols with unbounded sessions. (English) Zbl 07559487
Konnov, Igor (ed.) et al., 31st international conference on concurrency theory. CONCUR 2020, September 1–4, 2020, Vienna, Austria, virtual conference. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 171, Article 31, 23 p. (2020).
MSC:
68Q85
Synchronous constructive cryptography. (English) Zbl 1485.94108
Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12551, 439-472 (2020).
On security of the SESPAKE protocol. (Russian. English summary) Zbl 1462.94052
Protocols for secure test on relationship on number axis. (Chinese. English summary) Zbl 1474.68037
An efficient secure division protocol using approximate multi-bit product and new constant-round building blocks. (English) Zbl 07314291
Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 357-376 (2020).
Random walks and concurrent zero-knowledge. (English) Zbl 07314275
Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 24-44 (2020).
Computing knowledge in equational extensions of subterm convergent theories. (English) Zbl 1495.68113
There is always an exception: controlling partial information leakage in secure computation. (English) Zbl 1446.68025
Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 133-149 (2020).
Card-based protocol against actively revealing card attack. (English) Zbl 1540.68091
Martín-Vide, Carlos (ed.) et al., Theory and practice of natural computing. 8th international conference, TPNC 2019, Kingston, ON, Canada, December 9–11, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11934, 95-106 (2019).
Practical formal methods for real world cryptography (invited talk). (English) Zbl 1519.94053
Chattopadhyay, Arkadev (ed.) et al., 39th IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2019, Bombay, India, December 11–13, 2019. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 150, Article 1, 12 p. (2019).
Formalizing and proving privacy properties of voting protocols using alpha-beta privacy. (English) Zbl 1496.68136
Sako, Kazue (ed.) et al., Computer security – ESORICS 2019. 24th European symposium on research in computer security, Luxembourg, September 23–27, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11735, 535-555 (2019).
Brief announcement: Multiparty interactive communication with private channels. (English) Zbl 1543.68025
Nowak, Thomas (ed.), Proceedings of the 38th ACM symposium on principles of distributed computing, PODC ’19, Toronto, ON, Canada, July 29 – August 2, 2019. New York, NY: Association for Computing Machinery (ACM). 147-149 (2019).
An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice. (English) Zbl 1487.68025
A blind coupon mechanism enabling veto voting over unreliable networks. (English) Zbl 1453.68024
Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 250-270 (2019).
Extended 3-party ACCE and application to LoRaWAN 1.1. (English) Zbl 1454.94057
Buchmann, Johannes (ed.) et al., Progress in cryptology – AFRICACRYPT 2019. 11th international conference on cryptology in Africa, Rabat, Morocco, July 9–11, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11627, 21-38 (2019).
On trees, chains and fast transactions in the blockchain. (English) Zbl 1454.94116
Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 327-351 (2019).
MSC:
94A62
Distributed trusted network connection architecture based on blockchain. (Chinese. English summary) Zbl 1449.68003
Automatic analysis of security of TLS1.3 protocol based on the symbolic model. (Chinese. English summary) Zbl 1438.68018
An anonymous and provably remote user authentication protocol using extended chaotic maps for multi-server system. (Chinese. English summary) Zbl 1438.68004
Security analysis model of behavior based on cryptographic protocols implement at source code level. (Chinese. English summary) Zbl 1438.68019
Blockchain technology: issues of analysis and synthesis. (English. Russian original) Zbl 1443.68029
Cybern. Syst. Anal. 55, No. 3, 488-495 (2019); translation from Kibern. Sist. Anal. 2019, No. 3, 164-172 (2019).
Modeling and analysis of the impact of adaptive defense strategy on virus spreading. (English) Zbl 1512.68053
Practical and provably secure onion routing. (English) Zbl 1499.68044
Chatzigiannakis, Ioannis (ed.) et al., 45th international colloquium on automata, languages, and programming. ICALP 2018, Prague, Czech Republic, July 9–13, 2018. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 107, Article 144, 14 p. (2018).
Analysing privacy-type properties in cryptographic protocols (invited talk). (English) Zbl 1462.68017
Kirchner, Hélène (ed.), 3rd international conference on formal structures for computation and deduction, FSCD 2018, July 9–12, 2018, Oxford, United Kingdom. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 108, Article 1, 21 p. (2018).
Intercepting blackhole attacks in MANETs: an ASM-based model. (English) Zbl 1461.68047
Cerone, Antonio (ed.) et al., Software engineering and formal methods. SEFM 2017 collocated workshops: DataMod, FAACS, MSE, CoSim-CPS, and FOCLASA, Trento, Italy, September 4–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10729, 137-152 (2018).
TinyKeys: a new approach to efficient multi-party computation. (English) Zbl 1446.94135
Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10993, 3-33 (2018).
MSC:
94A60
DC programming and DCA for enhancing physical layer security in amplify-and-forward relay beamforming networks based on the SNR approach. (English) Zbl 1429.68024
Le, Nguyen-Thinh (ed.) et al., Advanced computational methods for knowledge engineering. Proceedings of the 5th international conference on computer science, applied mathematics and applications, ICCSAMA 2017, Berlin, Germany, June 30 – July 1, 2017. Cham: Springer. Adv. Intell. Syst. Comput. 629, 23-33 (2018).
Still wrong use of pairings in cryptography. (English) Zbl 1427.94083
MSC:
94A60
Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments. (English) Zbl 1423.94130
Advance in TLS 1.3 protocol studies. (Chinese. English summary) Zbl 1438.68021
Brief announcement: Asynchronous secure distributed computing with transferrable non-equivocation revisited. (English) Zbl 1428.68059
Proceedings of the 37th ACM symposium on principles of distributed computing, PODC ’18, Egham, UK, July 23–27, 2018. New York, NY: Association for Computing Machinery (ACM). 265-267 (2018).
ID-based public auditing protocol for cloud storage data integrity checking with strengthened authentication and security. (English) Zbl 1424.68011
Direct anonymous authentication protocol for roaming services based on fuzzy identity. (Chinese. English summary) Zbl 1424.68015
User-mediated authentication protocols and unforgeability in key collision. (English) Zbl 1443.94091
Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 387-396 (2018).
The applied pi calculus, mobile values, new names, and secure communication. (English) Zbl 1426.68037
Shorter double-authentication preventing signatures for small address spaces. (English) Zbl 1423.94132
Joux, Antoine (ed.) et al., Progress in cryptology – AFRICACRYPT 2018. 10th international conference on cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10831, 344-361 (2018).
MSC:
94A62
Secret key amplification from uniformly leaked key exchange complete graph. (English) Zbl 1498.68058
Rahman, M. Sohel (ed.) et al., WALCOM: algorithms and computation. 12th international conference, WALCOM 2018, Dhaka, Bangladesh, March 3–5, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10755, 20-31 (2018).
Filter Results by …
Document Type
- Journal Articles (318)
- Collection Articles (225)
- Books (44)
all
top 5
Author
- Delaune, Stéphanie (16)
- Cortier, Véronique (12)
- Kremer, Steve (9)
- Boyd, Colin A. (8)
- Canetti, Ran (8)
- Rangan, Chandrasekharan Pandu (7)
- Rusinowitch, Michaël (7)
- Srinathan, Kannan (7)
- Abadi, Martín (6)
- Feng, Dengguo (6)
- Chevalier, Céline (5)
- Chevalier, Yannick (5)
- Choudhary, Ashish (5)
- Comon-Lundh, Hubert (5)
- Cremers, Cas J. F. (5)
- Damgård, Ivan Bjerre (5)
- Dolev, Danny (5)
- Katz, Jonathan N. (5)
- Maurer, Ueli M. (5)
- Mitchell, John C. (5)
- Ostrovsky, Rafail (5)
- Patra, Arpita (5)
- Ščedrov, Andrej (5)
- Stebila, Douglas (5)
- Basin, David A. (4)
- Caleiro, Carlos (4)
- Cao, Zhenfu (4)
- Cheval, Vincent (4)
- Hazay, Carmit (4)
- Kurkowski, Mirosław (4)
- Lakhnech, Yassine (4)
- Li, Mengjun (4)
- Li, Zhoujun (4)
- Lindell, Yehuda (4)
- Martinelli, Fabio (4)
- Mauw, Sjouke (4)
- Naor, Moni (4)
- Penczek, Wojciech (4)
- Petrocchi, Marinella (4)
- Qing, Sihan (4)
- Turuani, Mathieu (4)
- Viganò, Luca (4)
- Wullschleger, Jürg (4)
- Zhang, Huanguo (4)
- Zhou, Ti (4)
- Asharov, Gilad (3)
- Baudet, Mathieu (3)
- Blanchet, Bruno (3)
- Chen, Huowang (3)
- Christianson, Bruce (3)
- Coffey, Tom (3)
- Compagna, Luca (3)
- Crispo, Bruno (3)
- Datta, Anupam (3)
- Davie, Bruce S. (3)
- Derek, Ante (3)
- Dojen, Reiner (3)
- Escobar, Santiago (3)
- Fournet, Cédric (3)
- Goldwasser, Shafi (3)
- Gouda, Mohamed G. (3)
- He, Debiao (3)
- Hwang, Minshiang (3)
- Kranakis, Evangelos Konstantinou (3)
- Küsters, Ralf (3)
- Menezes, Alfred J. (3)
- Mizuki, Takaaki (3)
- Mödersheim, Sebastian Alexander (3)
- Müller-Quade, Jörn (3)
- Pang, Jun (3)
- Peterson, Larry L. (3)
- Pieprzyk, Josef P. (3)
- Pujolle, Guy (3)
- Roe, Michael (3)
- Saia, Jared (3)
- Sone, Hideaki (3)
- Tseng, Yuh-Min (3)
- Ustaoglu, Berkant (3)
- Xu, Jing (3)
- Adão, Pedro (2)
- Alawatugoda, Janaka (2)
- Alekseev, Evgeny K. (2)
- Armando, Alessandro (2)
- Ashwinkumar, B. V. (2)
- Backes, Michael (2)
- Ban Kirigin, Tajana (2)
- Bao, Feng (2)
- Bazzi, Rida A. (2)
- Beimel, Amos (2)
- Bella, Giampaolo (2)
- Bhargavan, Karthikeyan (2)
- Book, Ronald Vernon (2)
- Boreale, Michele (2)
- Bresson, Emmanuel (2)
- Brumley, Billy Bob (2)
- Burmester, Mike V. D. (2)
- Cachin, Christian (2)
- Carbone, Marco (2)
- Cervesato, Iliano (2)
- Chadha, Rohit (2)
- and 1,113 more Authors
all
top 5
Serial
- Theor. Comput. Sci. (23)
- Comput. Netw. (19)
- Inf. Process. Lett. (13)
- Int. J. Appl. Cryptogr. (12)
- Inf. Comput. (11)
- J. Cryptology (9)
- J. Softw. (9)
- J. Autom. Reasoning (8)
- Inf. Sci. (7)
- Formal Asp. Comput. (7)
- Sci. China, Ser. F (7)
- Fundam. Inform. (6)
- ACM Trans. Comput. Log. (6)
- IEEE Trans. Inf. Theory (5)
- J. Comput. Syst. Sci. (5)
- Des. Codes Cryptography (5)
- Inf. Secur. Cryptogr. (5)
- SIAM J. Comput. (4)
- J. Parallel Distrib. Comput. (4)
- Wuhan Univ. J. Nat. Sci. (4)
- Informatica, Vilnius (4)
- Lect. Notes Comput. Sci. (4)
- J. Math. Cryptol. (4)
- Adv. Math. Commun. (4)
- IFIP, Int. Fed. Inf. Process. (4)
- Math. Comput. Modelling (3)
- J. Log. Algebr. Program. (3)
- Comput. Inform. (3)
- J. Shandong Univ., Nat. Sci. (3)
- J. Comput. Appl. (3)
- J. Log. Algebr. Methods Program. (3)
- Comput. Electr. Eng. (2)
- Comput. Math. Appl. (2)
- Computing (2)
- J. Wuhan Univ., Nat. Sci. Ed. (2)
- Int. J. Found. Comput. Sci. (2)
- Discrete Event Dyn. Syst. (2)
- Distrib. Comput. (2)
- Tatra Mt. Math. Publ. (2)
- Form. Methods Syst. Des. (2)
- J. Appl. Non-Class. Log. (2)
- J. Huazhong Univ. Sci. Technol. (2)
- Nord. J. Comput. (2)
- J. Autom. Lang. Comb. (2)
- Nonlinear Dyn. (2)
- J. ACM (2)
- J. Shaanxi Norm. Univ., Nat. Sci. Ed. (2)
- Mat. Strukt. Model. (2)
- J. UCS (2)
- Comput. Lang. Syst. Struct. (2)
- Internet Math. (2)
- J. Shanghai Jiaotong Univ., Sci. (2)
- Sci. Ann. Comput. Sci. (2)
- IET Control Theory Appl. (2)
- Symmetry (2)
- J. Appl. Math. Comput. Mech. (2)
- Prikl. Diskretn. Mat. (2)
- Mat. Vopr. Kriptografii (2)
- Discrete Appl. Math. (1)
- Int. J. Theor. Phys. (1)
- Phys. Lett., A (1)
- Appl. Math. Comput. (1)
- BIT (1)
- Fuzzy Sets Syst. (1)
- Inf. Control (1)
- Kybernetika (1)
- Synthese (1)
- Cryptologia (1)
- J. Algorithms (1)
- Sci. Comput. Program. (1)
- Nat. Sci. J. Xiangtan Univ. (1)
- Acta Sci. Nat. Univ. Sunyatseni (1)
- Math. Pract. Theory (1)
- J. Northeast Norm. Univ., Nat. Sci. Ed. (1)
- J. Symb. Comput. (1)
- J. Comput. Sci. Technol. (1)
- Algorithmica (1)
- COMPEL (1)
- J. Tsinghua Univ., Sci. Technol. (1)
- Data Knowl. Eng. (1)
- Future Gener. Comput. Syst. (1)
- Math. Struct. Comput. Sci. (1)
- SIAM Rev. (1)
- Appl. Algebra Eng. Commun. Comput. (1)
- Cybern. Syst. Anal. (1)
- Distrib. Parallel Databases (1)
- Vopr. Vychisl. Prikl. Mat. (1)
- Trans. Nanjing Univ. Aeronaut. Astronaut. (1)
- Obozr. Prikl. Prom. Mat. (1)
- Eur. J. Control (1)
- Theory Comput. Syst. (1)
- Log. J. IGPL (1)
- Soft Comput. (1)
- J. Zhengzhou Univ., Nat. Sci. Ed. (1)
- J. Interdiscip. Math. (1)
- J. Discrete Math. Sci. Cryptography (1)
- High.-Order Symb. Comput. (1)
- Commun. Nonlinear Sci. Numer. Simul. (1)
- J. Harbin Eng. Univ. (1)
- J. Mach. Learn. Res. (1)
- and 33 more Serials
all
top 5
Year of Publication
- 2024 (1)
- 2023 (13)
- 2022 (11)
- 2021 (19)
- 2020 (23)
- 2019 (14)
- 2018 (23)
- 2017 (15)
- 2016 (23)
- 2015 (20)
- 2014 (19)
- 2013 (22)
- 2012 (24)
- 2011 (26)
- 2010 (28)
- 2009 (30)
- 2008 (39)
- 2007 (44)
- 2006 (36)
- 2005 (21)
- 2004 (18)
- 2003 (27)
- 2002 (16)
- 2001 (10)
- 2000 (16)
- 1999 (4)
- 1998 (8)
- 1997 (4)
- 1996 (5)
- 1995 (5)
- 1994 (2)
- 1993 (4)
- 1992 (3)
- 1991 (4)
- 1989 (1)
- 1988 (1)
- 1986 (2)
- 1985 (1)
- 1983 (3)
- 1982 (1)
- 1978 (1)
all
top 3
Software
- AVISPA (31)
- Casper (21)
- HMQV (12)
- NAXOS (10)
- Akiss (9)
- YAPA (9)
- ProVerif (7)
- TAMARIN (7)
- CMQV+ (6)
- GitHub (6)
- Maude (6)
- NRL (5)
- OFMC (5)
- TAPS (5)
- Maude-NPA (4)
- Timbuk (4)
- scyther (4)
- Apte (3)
- FAST (3)
- HERMES (3)
- Isabelle (3)
- Isabelle/HOL (3)
- SPINS (3)
- CryptHOL (2)
- EC2C-PAKA (2)
- EasyCrypt (2)
- FDR2 (2)
- Interrogator (2)
- Isar (2)
- Kronos (2)
- LDYIS (2)
- MCMAS-X (2)
- PVS (2)
- PrivateLR (2)
- S-RIP (2)
- VerICS (2)
- ns-2 (2)
- ADSNARK (1)
- AGVI (1)
- ASGS (1)
- ASPIER (1)
- Accumulo (1)
- Anima (1)
- Archive Formal Proofs (1)
- Automath (1)
- BLISS (1)
- BOINC (1)
- Bigtable (1)
- Bouncy Castle (1)
- CCSTM (1)
- CafeOBJ (1)
- Chaff (1)
- Chord (1)
- CiME (1)
- CoChecker (1)
- CoSP (1)
- ConfiChair (1)
- CryptDB (1)
- Cryptimeleon (1)
- Crypto++ (1)
- Curve25519 (1)
- DroidBench (1)
- E-SETHEO (1)
- EAdroid (1)
- ECCE (1)
- ESC/Java (1)
- EasyUC (1)
- Ed448-Goldilocks (1)
- Erlang (1)
- FORSAKES (1)
- FROST (1)
- Freshml (1)
- G-Hadoop (1)
- GNUC (1)
- GloMoSim (1)
- Globus Toolkit (1)
- HACL* (1)
- HBase (1)
- HOL (1)
- HOL/SPIN (1)
- Hadoop (1)
- Haskell (1)
- Helena (1)
- Hive (1)
- Iolus (1)
- Isabelle/ZF (1)
- JML (1)
- Jasmin (1)
- JavaSPI (1)
- KEM-DEM (1)
- LALBLC (1)
- LOOP (1)
- Libgcrypt (1)
- Ligero (1)
- Lolli (1)
- MCMAS (1)
- MJ (1)
- ML (1)
- MapReduce (1)
- Matlab (1)
- and 48 more Software Packages