Cited By
View all- Rausch DKüsters RChevalier C(2022)Embedding the UC Model into the IITM ModelAdvances in Cryptology – EUROCRYPT 202210.1007/978-3-031-07085-3_9(242-272)Online publication date: 30-May-2022
- Comon HJacomme CScerri GLigatti JOu XKatz JVigna G(2020)Oracle Simulation: A Technique for Protocol Composition with Long Term Shared SecretsProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3417229(1427-1444)Online publication date: 30-Oct-2020
- Camenisch JEnderlein RKrenn SKüsters RRausch D(2016)Universal Composition with Responsive EnvironmentsProceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 1003210.1007/978-3-662-53890-6_27(807-840)Online publication date: 4-Dec-2016
- Show More Cited By