-
6
-
-
35048891868
-
Keying hash functions for message authentication
-
Springer
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Advances in Cryptology: CRYPTO ’96, volume 1109 of Lecture Notes in Computer Science, pages 1–15. Springer, 1996.
-
(1996)
Advances in Cryptology: CRYPTO ’96, Volume 1109 of Lecture Notes in Computer Science
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
12
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31–60, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
13
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79–130, 1994.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
14
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Proc. 5th ACM Conference on Computer and Communications Security, pages 112–121, 1998.
-
(1998)
Proc. 5Th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
16
-
-
0024665570
-
Using narrowing in the analysis of key management protocols
-
C. Meadows. Using narrowing in the analysis of key management protocols. In Proc. 10th IEEE Symposium on Security & Privacy, pages 138–147, 1989.
-
(1989)
Proc. 10Th IEEE Symposium on Security & Privacy
, pp. 138-147
-
-
Meadows, C.1
-
17
-
-
0021190844
-
The interrogator: A tool for cryptographic protocol security
-
J. K. Millen. The interrogator: A tool for cryptographic protocol security. In Proc. 5th IEEE Symposium on Security & Privacy, pages 134–141, 1984.
-
(1984)
Proc. 5Th IEEE Symposium on Security & Privacy
, pp. 134-141
-
-
Millen, J.K.1
-
18
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85–128, 1998.
-
(1998)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.1
-
19
-
-
85165843562
-
Cryptographic security of reactive systems. Presented at the DERA/RHUL Workshop on Secure Architectures and Information Flow, 1999
-
March
-
B. Pfitzmann, M. Schunter, and M. Waidner. Cryptographic security of reactive systems. Presented at the DERA/RHUL Workshop on Secure Architectures and Information Flow, 1999, Electronic Notes in Theoretical Computer Science (ENTCS), March 2000. http://www.elsevier.nl/cas/tree/store/tcs/free/noncas/pc/menu.htm.
-
(2000)
Electronic Notes in Theoretical Computer Science (ENTCS)
-
-
Pfitzmann, B.1
Schunter, M.2
Waidner, M.3
-
21
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184–200, 2001.
-
(2001)
Proc. 22Nd IEEE Symposium on Security & Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
|