-
1
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
Proceedings of the Fourth International Symposium on Theoretical Aspects of Computer Software, N. Kobayashi and B. Pierce, eds, Sendai, Japan, Springer-Verlag
-
M. Abadi and J. Jürgens, Formal eavesdropping and its computational interpretation, in: Proceedings of the Fourth International Symposium on Theoretical Aspects of Computer Software, N. Kobayashi and B. Pierce, eds, Volume 2215 of LNCS, Sendai, Japan, Springer-Verlag, 2001, pp. 82-94.
-
(2001)
LNCS
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürgens, J.2
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption), Journal of Cryptology 15(2) (2002), 103-127.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
32844458560
-
A universally composable cryptographic library
-
M. Backes, B. Pfitzmann and M. Waidner, A universally composable cryptographic library, Cryptology e Print Archive, Report 2003/015. Available at http://eprint.iacr.org/2003/015.
-
Cryptology e Print Archive, Report
, vol.2003
, Issue.15
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
5
-
-
84948957152
-
Public-key encryption in a multi-user setting: Security proofs and improvements
-
Number 1807 in LNCS, Springer-Verlag
-
M. Bellare, A. Boldyreva and S. Micali, Public-key encryption in a multi-user setting: Security proofs and improvements, in: Proceedings of Eurocrypt'00, Number 1807 in LNCS, Springer-Verlag, 2000, pp. 259-274.
-
(2000)
Proceedings of Eurocrypt'00
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
7
-
-
84945119254
-
Entity authentication and key distribution
-
Proceedings of CRYPTO '93
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Proceedings of CRYPTO '93, Volume 773 of Lecture Notes in Computer Science, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.773
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
84957693225
-
A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1
-
Proceedings of CRYPTO'98, Springer-Verlag
-
D. Bleichenbacher, A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1, in: Proceedings of CRYPTO'98, Volume 1462 of LNCS, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
-
-
Bleichenbacher, D.1
-
10
-
-
0343337504
-
Nonmalleable cryptography
-
D. Dolev, C. Dwork and M. Naor, Nonmalleable cryptography, SIAM Journal of Computing 30(2) (2000), 391-437.
-
(2000)
SIAM Journal of Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
12
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithm
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithm, IEEE Transactions on Information Theory 31 (1985), 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
13
-
-
0027306732
-
A uniform-complexity treatment of encryption and zero-knowledge
-
O. Goldreich, A uniform-complexity treatment of encryption and zero-knowledge, Journal of Cryptology 6(1) (1993), 21-53.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 21-53
-
-
Goldreich, O.1
-
16
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
G. Lowe, An attack on the Needham-Schroeder public key authentication protocol, Information processing letters 56(3) (1995), 131-136.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-136
-
-
Lowe, G.1
-
17
-
-
0003130993
-
Breaking and fixing the Needham-Schroeder algorithm
-
Springer-Verlag
-
G. Lowe, Breaking and fixing the Needham-Schroeder algorithm, in: Proceedings of TACAS'96, Springer-Verlag, 1996, pp. 147-166.
-
(1996)
Proceedings of TACAS'96
, pp. 147-166
-
-
Lowe, G.1
-
18
-
-
84883364893
-
Failures divergence refinement
-
Version 1.3
-
F. S. E. Ltd., Failures divergence refinement - User Manual and Tutorial, 1993, Version 1.3.
-
(1993)
User Manual and Tutorial
-
-
-
19
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows, The NRL protocol analyzer: An overview, Journal of Logic Programming 26(2) (1996), 113-131.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
20
-
-
0023985474
-
The notion of security for probabilistic cryptosystems
-
S. Micali, C. Rackoff and B. Sloan, The notion of security for probabilistic cryptosystems, SIAM Journal of Computing 17(2) (1988), 412-426.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 412-426
-
-
Micali, S.1
Rackoff, C.2
Sloan, B.3
-
21
-
-
0344875571
-
Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
-
Preliminary version in WITS 2002
-
D. Micciancio and B. Warinschi, Completeness theorems for the Abadi-Rogaway logic of encrypted expressions, Journal of Computer Security 12(1) (2004), 99-129. (Preliminary version in WITS 2002.)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 99-129
-
-
Micciancio, D.1
Warinschi, B.2
-
22
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Theory of Cryptography Conference - Proceedings of TCC 2004, M. Naor, ed., Cambridge, MA, USA, Springer-Verlag
-
D. Micciancio and B. Warinschi, Soundness of formal encryption in the presence of active adversaries, in: Theory of Cryptography Conference - Proceedings of TCC 2004, M. Naor, ed., Volume 2951 of Lecture Notes in Computer Science, Cambridge, MA, USA, Springer-Verlag, 2004, pp. 133-151.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
23
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen cipher text attacks
-
M. Naor and M. Yung, Public-key cryptosystems provably secure against chosen cipher text attacks, in: STOC'90, 1990, pp. 427-437.
-
(1990)
STOC'90
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
25
-
-
84974554584
-
Noninteractive zero-knowledge proofs of knowledge and chosen ciphertext attack
-
C. Rackoff and D. Simon, Noninteractive zero-knowledge proofs of knowledge and chosen ciphertext attack, in: Advances in Cryptology - CRYPTO'91, 1991, pp. 433-444.
-
(1991)
Advances in Cryptology - CRYPTO'91
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
-
27
-
-
17144422244
-
A proposal for an ISO standard for public key encryption
-
V. Shoup, A proposal for an ISO standard for public key encryption, Cryptology ePrint Archive, Report 2001/112. Available at http://eprint.iacr.org/2001/112.
-
Cryptology EPrint Archive, Report
, vol.2001
, Issue.112
-
-
Shoup, V.1
-
28
-
-
33645607716
-
Why chosen ciphertext security matters
-
IBM
-
V. Shoup, Why chosen ciphertext security matters, Technical Report RZ3076, IBM, 1998. http://www.shoup.net.
-
(1998)
Technical Report
, vol.RZ3076
-
-
Shoup, V.1
-
30
-
-
84942255620
-
A computational analysis of the Needham-Schroeder (-Lowe) protocol
-
ACM Press
-
B. Warinschi, A computational analysis of the Needham-Schroeder (-Lowe) protocol, in: Proceed-ings of 16th Computer Science Foundation Workshop, ACM Press, 2003, pp. 248-262.
-
(2003)
Proceed-ings of 16th Computer Science Foundation Workshop
, pp. 248-262
-
-
Warinschi, B.1
|