Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 78 publications
(49 citation statements)
references
References 175 publications
(191 reference statements)
0
49
0
Order By: Relevance
“…So far, we have introduced the formal machinery and the attacker model, similar to (symbolic) formal security [3] -a methodology that has proven itself in practice. Our definition of robustness properties are also similar to formal computer security.…”
Section: Robustnessmentioning
confidence: 99%
See 1 more Smart Citation
“…So far, we have introduced the formal machinery and the attacker model, similar to (symbolic) formal security [3] -a methodology that has proven itself in practice. Our definition of robustness properties are also similar to formal computer security.…”
Section: Robustnessmentioning
confidence: 99%
“…In computer security -be it symbolic security [3] or provable security [15] -the notions surrounding the attacker model and security properties are well established. Deviations from the default attacker model are subject to extra scrutiny.…”
Section: Introductionmentioning
confidence: 99%
“…Broadly speaking, this line of work aims to automatically obtain strong protocol security guarantees under sufficiently strong assumptions on the security of cryptographic primitives. Good surveys of this work include [7,8]. We discuss existing approaches and their limitations in greater detail later in this section.…”
Section: Introductionmentioning
confidence: 99%
“…We refer to [37,49] for a recent account of symbolic verification and focus on verification tools and methods for the computational model, and cryptographic soundness.…”
Section: Related Workmentioning
confidence: 99%
“…There has been extensive work on the formal verification of key exchange protocols, see for instance the recent survey [37]. A significant amount of work is carried in the symbolic model.…”
Section: Synthesis Of Cryptographic Constructionsmentioning
confidence: 99%