Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by Marie-Jeanne Toussaint

Deriving the Complete Knowledge of Participants in Cryptographic Protocols

English

Related publications

Programming Cryptographic Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Cryptographic Protocols From Lattices

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Multi-Exponentiation (Cryptographic Protocols)

IEE Proceedings - Computers and Digital Techniques
1994English

Cryptographic Protocols for Electronic Voting

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

First-Order Verification of Cryptographic Protocols

Journal of Computer Security
RiskComputer NetworksHardwareCommunicationsReliabilitySafetyArchitectureQualitySoftware
2003English

Resource Fairness and Composability of Cryptographic Protocols

Journal of Cryptology
Applied MathematicsComputer Science ApplicationsSoftware
2010English

Resource Fairness and Composability of Cryptographic Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

Equivalence Properties by Typing in Cryptographic Branching Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

G2C: Cryptographic Protocols From Goal-Driven Specifications

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2026 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy