Secrecy types for a simulatable cryptographic library

Peeter Laud. Secrecy types for a simulatable cryptographic library. In Vijay Atluri, Catherine Meadows, Ari Juels, editors, Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005. pages 26-35, ACM, 2005. [doi]

@inproceedings{Laud05,
  title = {Secrecy types for a simulatable cryptographic library},
  author = {Peeter Laud},
  year = {2005},
  doi = {10.1145/1102120.1102126},
  url = {http://doi.acm.org/10.1145/1102120.1102126},
  researchr = {https://researchr.org/publication/Laud05},
  cites = {0},
  citedby = {0},
  pages = {26-35},
  booktitle = {Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005},
  editor = {Vijay Atluri and Catherine Meadows and Ari Juels},
  publisher = {ACM},
  isbn = {1-59593-226-7},
}