"Efficient representation of the attacker's knowledge in cryptographic ..."

Ivan Cibrario Bertolotti et al. (2008)

Details and statistics

DOI: 10.1007/S00165-008-0078-3

access: open

type: Journal Article

metadata version: 2022-05-09

a service of  Schloss Dagstuhl - Leibniz Center for Informatics