-
1
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
Proceedings of the Fourth International Symposium on Theoretical Aspects of Computer Software, N. Kobayashi and B. Pierce, eds, Sendai, Japan, Springer-Verlag
-
M. Abadi and J. Jürgens, Formal eavesdropping and its computational interpretation, in: Proceedings of the Fourth International Symposium on Theoretical Aspects of Computer Software, Volume 2215 of LNCS, N. Kobayashi and B. Pierce, eds, Sendai, Japan, Springer-Verlag, 2001, pp. 82-94.
-
(2001)
LNCS
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürgens, J.2
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption), Journal of Cryptology 15(2) (2002), 103-127.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
84945121341
-
Does encryption with redundancy provide authenticity?
-
Advances in Cryptology - EUROCRYPT 2001, Berlin, Germany, Springer-Verlag
-
J. An and M. Bellare, Does encryption with redundancy provide authenticity? in: Advances in Cryptology - EUROCRYPT 2001, Volume 2045 of LNCS, Berlin, Germany, Springer-Verlag, 2001, pp. 512-528.
-
(2001)
LNCS
, vol.2045
, pp. 512-528
-
-
An, J.1
Bellare, M.2
-
4
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Advances in Cryptology - CRYPTO 1998, Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations among notions of security for public-key encryption schemes, in: Advances in Cryptology - CRYPTO 1998, Volume 1462 of LNCS, Springer-Verlag, 1998, pp. 26-45.
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
5
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Advances in Cryptology -ASIACRYPT, Springer-Verlag
-
M. Bellare and C. Namprempre, Authenticated encryption: relations among notions and analysis of the generic composition paradigm, in: Advances in Cryptology -ASIACRYPT, Volume 1976 of LNCS, Springer-Verlag, 2000, pp. 531-545.
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
6
-
-
84958968987
-
Fast encryption and authentication: XCBC encryption and XECB authentication modes
-
Fast Software Encryption, Springer-Verlag
-
V. Gligor and P. Donescu, Fast encryption and authentication: XCBC encryption and XECB authentication modes, in: Fast Software Encryption, Volume 2355 of LNCS, Springer-Verlag, 2001, pp. 92-108.
-
(2001)
LNCS
, vol.2355
, pp. 92-108
-
-
Gligor, V.1
Donescu, P.2
-
10
-
-
84945137421
-
Encryption modes with almost free message integrity
-
Advances in Cryptology - EUROCRYPT 2001, B. Pfitzmann, ed., Springer-Verlag
-
C. Jutla, Encryption modes with almost free message integrity, in: Advances in Cryptology - EUROCRYPT 2001, Volume 2045 of LNCS, B. Pfitzmann, ed., Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2045
-
-
Jutla, C.1
-
11
-
-
84880901653
-
The order of encryption and authentication for protecting communication
-
Advances in Cryptology - CRYPTO 2001, Berlin, Germany, Springer-Verlag
-
H. Krawczyk, The order of encryption and authentication for protecting communication, in: Advances in Cryptology - CRYPTO 2001, Volume 2139 of LNCS, Berlin, Germany, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
-
-
Krawczyk, H.1
-
12
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
P. Lincoln, J. Mitchell, M. Mitchell and A. Scedrov, A probabilistic poly-time framework for protocol analysis, in: Proceedings of the 5th ACM Conference on Computer and Communications Security, 1998, pp. 112-121.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
14
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
ACM Press
-
P. Rogaway, M. Bellare, J. Black and T. Krovetz, OCB: A block-cipher mode of operation for efficient authenticated encryption, in: Proceedings of the 8th ACM Conference on Computer and Communication security, ACM Press, 2001, pp. 196-205.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communication Security
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
|