This HTML5 document contains 25 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
n16http://purl.org/ontology/bibo/status/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n14https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n18https://kar.kent.ac.uk/id/eprint/78724#
n3http://eprints.org/ontology/
n15http://www.loc.gov/loc.terms/relators/
bibohttp://purl.org/ontology/bibo/
n7https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n17http://purl.org/ontology/bibo/degrees/
n4https://kar.kent.ac.uk/id/document/
n10https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n13https://kar.kent.ac.uk/78724/
n9https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n11https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:78724
rdf:type
bibo:Thesis n3:EPrint n3:ThesisEPrint bibo:Article
rdfs:seeAlso
n13:
n15:THS
n11:ext-s.j.thompson@kent.ac.uk n11:ext-eerke.boiten@dmu.ac.uk
n3:hasDocument
n4:3194314 n4:3194315 n4:3194306 n4:3194316 n4:3194311 n4:3194313
dcterms:issuer
n7:ext-e69ffaf65adbe669a239fc71d288812e n7:ext-6cd37a476c4a651d5173fe60c50f2f23
dcterms:title
Transformation of cryptographic primitives: provable security and proof presentation
wdrs:describedby
n9:export_kar_RDFN3.n3 n14:export_kar_RDFN3.n3
dcterms:date
2019-11
dcterms:creator
n11:ext-jg478@kent.ac.uk
bibo:status
n16:published
bibo:abstract
We analyse transformations between cryptographic primitives and, for each transformation, we do two studies: its provable security (proving that if the original cryptographic primitive is secure, then the transformed cryptographic primitive is also secure); its proof presentation (exploring improved ways of presenting the proof). Our contributions divide into two sets: security proofs (sometimes new proofs and sometimes variants of known proofs); proof presentations (inspired by our security proofs) and extraction of lessons learned from them.
dcterms:isPartOf
n10:repository
bibo:authorList
n18:authors
bibo:degree
n17:phd