메뉴 건너뛰기




Volumn 2729, Issue , 2003, Pages 530-547

Weak key authenticity and the computational completeness of formal encryption

Author keywords

Authentication; Completeness; Cryptography; Encryption; Formal Reasoning; Weak Key Authenticity

Indexed keywords

AUTHENTICATION; FORMAL LANGUAGES; FORMAL METHODS; SECURITY OF DATA; SEMANTICS;

EID: 24144446250     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45146-4_31     Document Type: Article
Times cited : (16)

References (15)
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling Two Views of Cryptography (the computational soundness of formal encryption)
    • M. Abadi, P. Rogaway. Reconciling Two Views of Cryptography (the computational soundness of formal encryption). In Journal of Cryptology, vol. 15, no. 2, pp. 103-128.
    • Journal of Cryptology , vol.15 , Issue.2 , pp. 103-128
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 35248853372 scopus 로고    scopus 로고
    • Proc. of the First IFIP International Conference on. Theoretical Computer Science, Springer Verlag, Berlin, August
    • (also in Proc. of the First IFIP International Conference on. Theoretical Computer Science, LNCS vol. 1872, pp. 3-22, Springer Verlag, Berlin, August 2000.)
    • (2000) LNCS , vol.1872 , pp. 3-22
  • 4
    • 84946837370 scopus 로고    scopus 로고
    • Key-Privacy in Public-Key Encryption
    • Advances in Cryptology - ASIACRYPT 2001, Springer Verlag
    • M. Bellare, A. Boldyreva, A. Desai, D. Pointcheval. Key-Privacy in Public-Key Encryption. In Advances in Cryptology - ASIACRYPT 2001, LNCS vol. 2248,pp. 566-582, Springer Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 566-582
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 6
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
    • Advances in Cryptology - ASIACRYPT 2000, Springer Verlag
    • M. Bellare, C. Namprempre. Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. In Advances in Cryptology - ASIACRYPT 2000, LNCS vol. 1976, pp. 541-545, Springer Verlag, 2000.
    • (2000) LNCS , vol.1976 , pp. 541-545
    • Bellare, M.1    Namprempre, C.2
  • 10
    • 84974720881 scopus 로고    scopus 로고
    • Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation
    • Proceedings of the 7th International Workshop on Fast Software Encryption (FSE 2000), Springer Verlag
    • J. Katz, M. Yung. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. In Proceedings of the 7th International Workshop on Fast Software Encryption (FSE 2000), LNCS vol. 1978, pp. 284-299, Springer Verlag, 2000.
    • (2000) LNCS , vol.1978 , pp. 284-299
    • Katz, J.1    Yung, M.2
  • 13
    • 35048833694 scopus 로고    scopus 로고
    • Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions
    • to appear
    • D. Micciancio, B. Warinschi. Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions. In Journal of Computer Security (to appear).
    • Journal of Computer Security
    • Micciancio, D.1    Warinschi, B.2
  • 15
    • 84972541021 scopus 로고
    • A Lattice-theoretical Fixpoint Theorem and its Applications
    • A. Tarski. A Lattice-theoretical Fixpoint Theorem and its Applications. In Pacific Journal of Mathematics, vol. 5, pp.285-309, 1955.
    • (1955) Pacific Journal of Mathematics , vol.5 , pp. 285-309
    • Tarski, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.