메뉴 건너뛰기




Volumn 648 LNCS, Issue , 1992, Pages 77-101

Separating the specification and implementation phases in cryptology

(1)  Toussaint, Marie Jeanne a  

a NONE   (Belgium)

Author keywords

Cryptographic protocol; Cryptology; Formal verification; Knowledge; Protocol execution tree; Security; State

Indexed keywords

CRYPTOGRAPHY; FORMAL VERIFICATION; SECURITY OF DATA; SECURITY SYSTEMS; SPECIFICATIONS;

EID: 0003537268     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0013893     Document Type: Conference Paper
Times cited : (4)

References (22)
  • 3
    • 85031773397 scopus 로고
    • Secure Audio Teleconference
    • C. Pomerance, editor, Lecture Notes in Computer Science, Springer-Verlag
    • E.F. Brickell, P.J. Lee, and Y. Yacobi. Secure Audio Teleconference. In C. Pomerance, editor, Lecture Notes in Computer Science. Advances in Cryptology — CRYPTO'87, #293, pages 418-426. Springer-Verlag, 1988.
    • (1988) Advances in Cryptology — CRYPTO'87 , vol.293 , pp. 418-426
    • Brickell, E.F.1    Lee, P.J.2    Yacobi, Y.3
  • 4
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
    • M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal on Computing, 13(4):850-864, 1984.
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 5
    • 85029522966 scopus 로고
    • CCITT. CCITT blue book, Recommendation X.509, The Directory — Authentication Framework, November
    • CCITT. CCITT blue book, Recommendation X.509, The Directory — Authentication Framework, November 1988.
    • (1988)
  • 6
    • 85029524224 scopus 로고
    • Don Coppersmith. Analysis of ISO/CCTTI Document X.509 Annex D. IBM Thomas J. Watson Research Center, Yorktown Heights, June
    • Don Coppersmith. Analysis of ISO/CCTTI Document X.509 Annex D. IBM Thomas J. Watson Research Center, Yorktown Heights, June 1989.
    • (1989)
  • 7
    • 84990731886 scopus 로고
    • How to Prove Yourself: Practical Solutions to Identification and Signature Problems
    • A. M. Odlyzko, editorLecture Notes in Computer Science, Springer-Verlag
    • A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In A. M. Odlyzko, editor, Lecture Notes in Computer Science. Advances in Cryptology — CRYPTO'86, #263, pages 186-194. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology — CRYPTO'86 , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 8
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof-Systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal on Computing, 18(1):186-208, 1989.
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 10
    • 16644392725 scopus 로고
    • Security Defects in CCITT Recommendation X.509 — The Directory Authentication Framework
    • C I'Anson and C. Mitchell. Security Defects in CCITT Recommendation X.509 — The Directory Authentication Framework. Computer Communication Review, 20(2):30-34, 1990.
    • (1990) Computer Communication Review , vol.20 , Issue.2 , pp. 30-34
    • I'anson, C.1    Mitchell, C.2
  • 11
    • 85029509211 scopus 로고
    • ISO. 7498-2. Information processing systems-Open Systems Interconnection-Basic Reference Model-Part 2: Security Architecture
    • ISO. 7498-2. Information processing systems-Open Systems Interconnection-Basic Reference Model-Part 2: Security Architecture, 1989.
    • (1989)
  • 12
    • 0024665744 scopus 로고
    • Analyzing Encryption Protocols Using Formal Verification Techniques
    • R. A. Kemmerer. Analyzing Encryption Protocols Using Formal Verification Techniques. IEEE Journal on Selected Areas in Communications, 7(4):448-457, 1989.
    • (1989) IEEE Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.A.1
  • 14
    • 0025599775 scopus 로고
    • Representing Partial Knowledge in an Algebraic Security Model
    • IEEE Computer Society Press
    • C. Meadows. Representing Partial Knowledge in an Algebraic Security Model. In Proceedings of the Computer Security Foundations Workshop III, pages 23-31. IEEE Computer Society Press, 1990.
    • (1990) Proceedings of the Computer Security Foundations Workshop III , pp. 23-31
    • Meadows, C.1
  • 15
    • 0004256761 scopus 로고
    • PhD thesis, Georgia Institute of Technology
    • M. J. Merritt. Cryptographic Protocols. PhD thesis, Georgia Institute of Technology, 1983.
    • (1983) Cryptographic Protocols
    • Merritt, M.J.1
  • 19
    • 0003537266 scopus 로고
    • Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract)
    • November
    • M-J. Toussaint. Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract), in the proceedings of ASIACRYPT'91, November 1991.
    • (1991) The Proceedings of ASIACRYPT'91
    • Toussaint, M.-J.1
  • 20
    • 33644933823 scopus 로고
    • PhD thesis, Université de Liège (Belgium), the Publications Collection (to appear)
    • M.-J. Toussaint. Verification of Cryptographic Protocols. PhD thesis, Université de Liège (Belgium), 1991. in the Publications Collection (to appear).
    • (1991) Verification of Cryptographic Protocols
    • Toussaint, M.-J.1
  • 21
    • 0003690988 scopus 로고
    • Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract)
    • J. Feigenbaum, editor, Lecture Notes in Computer Science, Springer-Verlag
    • M-J. Toussaint. Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract). In J. Feigenbaum, editor, Lecture Notes in Computer Science. Advances in Cryptology — CRYPT0'91, #576, pages 24-43. Springer-Verlag, 1992.
    • (1992) Advances in Cryptology — CRYPT0'91 , vol.576 , pp. 24-43
    • Toussaint, M.-J.1
  • 22
    • 82755165301 scopus 로고
    • Reasoning about Cryptographic Protocols (Extended Abstract)
    • Joan Feigenbaum and Michael Merritt, editors, October, DIMACS-Series in Discrete Mathematics and Theoretical Computer Science (AMS-ACM)
    • M-J. Toussaint and P. Wolper. Reasoning about Cryptographic Protocols (Extended Abstract). In Joan Feigenbaum and Michael Merritt, editors, Distributed Computing and Cryptography (October 1989), pages 245-262. DIMACS-Series in Discrete Mathematics and Theoretical Computer Science (AMS-ACM), 1991. Volume 2.
    • (1989) Distributed Computing and Cryptography , vol.2 , pp. 245-262
    • Toussaint, M.-J.1    Wolper, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.