-
1
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
N. Kobayashi and B. Pierce, editors, Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software - TACS 2001, Sendai, Japan, Oct. Springer-Verlag
-
M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In N. Kobayashi and B. Pierce, editors, Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software - TACS 2001, volume 2215 of Lecture Notes in Computer Science, pages 82-94, Sendai, Japan, Oct. 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2): 103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
4944234643
-
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
-
Pacific Grove, CA, USA, June. IEEE Computer Society
-
M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In Proceedings of the 17th IEEE computer security foundations Workshop, pages 204-218, Pacific Grove, CA, USA, June 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 17th IEEE Computer Security Foundations Workshop
, pp. 204-218
-
-
Backes, M.1
Pfitzmann, B.2
-
4
-
-
1442292329
-
A composable cryptographic library with nested operations
-
Washington, DC, USA, Oct. ACM
-
M. Backes, B. Pfitzmann, and M. Waidner. A Composable Cryptographic Library with Nested Operations. In Proceedings of the 10th ACM conference on computer and communications security - CCS 2003, pages 220-230, Washington, DC, USA, Oct. 2003. ACM.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security - CCS 2003
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
5
-
-
0029723583
-
Adaptively secure multiparty computation
-
Philadelphia, Pennsylvania, USA, May. ACM
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively Secure Multiparty Computation. In Proceedings of the twenty-eighth annual ACM symposium on the theory of computing - STOC '96, pages 639-648, Philadelphia, Pennsylvania, USA, May 1996. ACM.
-
(1996)
Proceedings of the Twenty-eighth Annual ACM Symposium on the Theory of Computing - STOC '96
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
6
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
New York, NY, Mar. IEEE
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In INFOCOM 1999. Proceedings of the Eighteenth Annual Joint conference of the IEEE computer and communications societies, volume 2, pages 708-716, New York, NY, Mar. 1999. IEEE.
-
(1999)
INFOCOM 1999. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
7
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May. Springer-Verlag
-
R. Canetti, T. Malkin, and K. Nissim. Efficient communication-storage tradeoffs for multicast encryption. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, volume 1592 of Lecture Notes in Computer Science, Prague, Czech Republic, May 1999. Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
8
-
-
0343337504
-
Nonmalleable cyptography
-
Preliminary version in STOC 1991
-
D. Dolev, C. Dwork, and M. Naor. Nonmalleable Cyptography. SIAM Journal on Computing, 30(2):391-437, 2000. Preliminary version in STOC 1991.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
9
-
-
4243148483
-
Magic functions
-
Nov.
-
C. Dwork, M. Naor, O. Reingold, and L. Stockmeyer. Magic Functions. Journal of the ACM, 50(6):852-921, Nov. 2003.
-
(2003)
Journal of the ACM
, vol.50
, Issue.6
, pp. 852-921
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.4
-
10
-
-
24144446250
-
Weak key authenticity and the computational completeness of formal encryption
-
D. Boneh, editor, Advances in cryptology CRYPTO 2003, proceedings of the 23rd annual international cryptology conference, Santa Barbara, California, USA, Aug. Springer-Verlag
-
V. Gligor and D. O. Horvitz. Weak Key Authenticity and the Computational Completeness of Formal Encryption. In D. Boneh, editor, Advances in cryptology CRYPTO 2003, proceedings of the 23rd annual international cryptology conference, volume 2729 of Lecture Notes in Computer Science, pages 530-547, Santa Barbara, California, USA, Aug. 2003. Springer-Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 530-547
-
-
Gligor, V.1
Horvitz, D.O.2
-
11
-
-
0021409284
-
Probabilistic encryption
-
Preliminary version in Proc. of STOC 1982
-
S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sience, 28(2):270-299, 1984. Preliminary version in Proc. of STOC 1982.
-
(1984)
Journal of Computer and System Sience
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
13
-
-
0345412676
-
Logics for reasoning about cryptographic constructions
-
Cambridge, MA, USA, Nov. IEEE
-
R. Impagliazzo and B. Kapron. Logics for Reasoning about Cryptographic Constructions. In Proceedings of the 44rd annual symposium on foundations of computer science - FOCS 2003, pages 372-383, Cambridge, MA, USA, Nov. 2003. IEEE.
-
(2003)
Proceedings of the 44rd Annual Symposium on Foundations of Computer Science - FOCS 2003
, pp. 372-383
-
-
Impagliazzo, R.1
Kapron, B.2
-
14
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
Berkeley, CA, USA, May. IEEE Computer Society
-
P. Laud. Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. In IEEE symposium on security and Privacy, pages 71-85, Berkeley, CA, USA, May 2004. IEEE Computer Society.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 71-85
-
-
Laud, P.1
-
15
-
-
0032218226
-
A probabilistic polytime framework for protocol analysis
-
San Francisco, California, USA, Nov. ACM
-
P. D. Lincoln, J. C. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic polytime framework for protocol analysis. In Proceedings of the fifth ACM conference on computer and communications security - CCS '98, pages 112-121, San Francisco, California, USA, Nov. 1998. ACM.
-
(1998)
Proceedings of the Fifth ACM Conference on Computer and Communications Security - CCS '98
, pp. 112-121
-
-
Lincoln, P.D.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
18
-
-
25444488186
-
Optimal communication complexity of generic multicast key distributio
-
C. Cachin and J. Camenisch, editors, Advances in cryptology - EUROCRYPT 2004, proceedings of the internarional conference on the theory and application of cryptographic techniques, Interlaken, Switzerland, May. Springer-Verlag
-
D. Micciancio and S. Panjwani. Optimal communication complexity of generic multicast key distributio. In C. Cachin and J. Camenisch, editors, Advances in cryptology - EUROCRYPT 2004, proceedings of the internarional conference on the theory and application of cryptographic techniques, volume 3027 of Lecture Notes in Computer Science, Interlaken, Switzerland, May 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
-
-
Micciancio, D.1
Panjwani, S.2
-
19
-
-
0344875571
-
Completeness theorems for the abadi-rogaway logic of encrypted expressions
-
Preliminary version in WITS 2002
-
D. Micciancio and B. Warinschi. Completeness theorems for the abadi-rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004. Preliminary version in WITS 2002.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 99-129
-
-
Micciancio, D.1
Warinschi, B.2
-
20
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
M. Naor, editor, Theory of cryptography conference Proceedings of TCC 2004, Cambridge, MA, USA, Feb. Springer-Verlag
-
D. Micciancio and B. Warinschi. Soundness of Formal Encryption in the presence of Active Adversaries. In M. Naor, editor, Theory of cryptography conference Proceedings of TCC 2004, volume 2951 of Lecture Notes in Computer Science, pages 133-151, Cambridge, MA, USA, Feb. 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
21
-
-
0002360237
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
J. Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, Proceedings, Santa Barbara, California, USA, Aug. Springer-Verlag
-
C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, Proceedings, volume 576 of Lecture Notes in Computer Science, Santa Barbara, California, USA, Aug. 1991. Springer-Verlag.
-
(1991)
Lecture Notes in Computer Science
, vol.576
-
-
Rackoff, C.1
Simon, D.R.2
-
22
-
-
0345565893
-
A survey of key management for secure group communication
-
Sept.
-
S. Rafaeli and D. Hutchinson. A survey of key management for secure group communication. ACM Computing Surveys, 35(3):309-329, Sept. 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchinson, D.2
-
23
-
-
0033893174
-
Secure group communications using key graphs
-
Feb. Preliminary version in SIGCOMM 1998
-
C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8(1): 16-30, Feb. 2000. Preliminary version in SIGCOMM 1998.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
|