-
2
-
-
85083027758
-
Reconciling Two Views of Cryptography (the computational soundness of formal encryption)
-
M. Abadi, P. Rogaway. Reconciling Two Views of Cryptography (the computational soundness of formal encryption). In Journal of Cryptology, vol. 15, no. 2, pp. 103-128.
-
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-128
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
35248853372
-
-
Proc. of the First IFIP International Conference on. Theoretical Computer Science, Springer Verlag, Berlin, August
-
(also in Proc. of the First IFIP International Conference on. Theoretical Computer Science, LNCS vol. 1872, pp. 3-22, Springer Verlag, Berlin, August 2000.)
-
(2000)
LNCS
, vol.1872
, pp. 3-22
-
-
-
4
-
-
84946837370
-
Key-Privacy in Public-Key Encryption
-
Advances in Cryptology - ASIACRYPT 2001, Springer Verlag
-
M. Bellare, A. Boldyreva, A. Desai, D. Pointcheval. Key-Privacy in Public-Key Encryption. In Advances in Cryptology - ASIACRYPT 2001, LNCS vol. 2248,pp. 566-582, Springer Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
6
-
-
84937407719
-
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
-
Advances in Cryptology - ASIACRYPT 2000, Springer Verlag
-
M. Bellare, C. Namprempre. Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. In Advances in Cryptology - ASIACRYPT 2000, LNCS vol. 1976, pp. 541-545, Springer Verlag, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 541-545
-
-
Bellare, M.1
Namprempre, C.2
-
7
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, S. Micali. How to Construct Random Functions. In Journal of the ACM, vol. 33, no. 4, pp. 792-807, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
84974720881
-
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation
-
Proceedings of the 7th International Workshop on Fast Software Encryption (FSE 2000), Springer Verlag
-
J. Katz, M. Yung. Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. In Proceedings of the 7th International Workshop on Fast Software Encryption (FSE 2000), LNCS vol. 1978, pp. 284-299, Springer Verlag, 2000.
-
(2000)
LNCS
, vol.1978
, pp. 284-299
-
-
Katz, J.1
Yung, M.2
-
12
-
-
0005443503
-
Fixpoint Theorems and Semantics: A Folk Tale
-
J. L. Lassez, V. L. Nguyen, E. A. Sonenberg. Fixpoint Theorems and Semantics: a Folk Tale. In Information Processing Letters, vol. 14, no. 3, 1982, pp. 112-116.
-
(1982)
Information Processing Letters
, vol.14
, Issue.3
, pp. 112-116
-
-
Lassez, J.L.1
Nguyen, V.L.2
Sonenberg, E.A.3
-
13
-
-
35048833694
-
Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions
-
to appear
-
D. Micciancio, B. Warinschi. Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions. In Journal of Computer Security (to appear).
-
Journal of Computer Security
-
-
Micciancio, D.1
Warinschi, B.2
-
15
-
-
84972541021
-
A Lattice-theoretical Fixpoint Theorem and its Applications
-
A. Tarski. A Lattice-theoretical Fixpoint Theorem and its Applications. In Pacific Journal of Mathematics, vol. 5, pp.285-309, 1955.
-
(1955)
Pacific Journal of Mathematics
, vol.5
, pp. 285-309
-
-
Tarski, A.1
|