-
1
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Advances in Cryptology - ASIACRYPT 2000, Springer-Verlag
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology - ASIACRYPT 2000, volume 1976 of LNCS, pages 531-545. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
4
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology - EUROCRYPT 2000, Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology - EUROCRYPT 2000, volume 1807 of LNCS, pages 139-155. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
Advances in Cryptology - EUROCRYPT 2000, Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Advances in Cryptology - EUROCRYPT 2000, volume 1807 of LNCS, pages 156-171. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
7
-
-
26444559794
-
Analysing password protocol security against off-line dictionary attacks
-
Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands
-
R. Corin, J. M. Doumen, and S. Etalle. Analysing password protocol security against off-line dictionary attacks. Technical report TR-CTIT-03-52, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands, 2003.
-
(2003)
Technical Report
, vol.TR-CTIT-03-52
-
-
Corin, R.1
Doumen, J.M.2
Etalle, S.3
-
8
-
-
13544254153
-
Guess what? Here is a new tool that finds some new guessing attacks
-
R. Corin, S. Malladi, J. Alves-Foss, and S. Etalle. Guess what? Here is a new tool that finds some new guessing attacks (extended abstract). In IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security (WITS), pages 62-71, 2003.
-
(2003)
IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security (WITS)
, pp. 62-71
-
-
Corin, R.1
Malladi, S.2
Alves-Foss, J.3
Etalle, S.4
-
10
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
Advances in Cryptology - EUROCRYPT 2003, Springer-Verlag
-
R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In Advances in Cryptology - EUROCRYPT 2003, volume 2656 of LNCS, pages 524-543. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
11
-
-
84880888233
-
Session key generation using human passwords only
-
Advances in Cryptology - CRYPTO 2001, Springer-Verlag
-
O. Goldreich and Y. Lindell. Session key generation using human passwords only. In Advances in Cryptology - CRYPTO 2001, volume 2139 of LNCS, pages 403-432. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 403-432
-
-
Goldreich, O.1
Lindell, Y.2
-
13
-
-
0025545832
-
Verifiable-text attacks in cryptographic protocols
-
L. Gong. Verifiable-text attacks in cryptographic protocols. In INFOCOM '90, pages 686-693, 1990.
-
(1990)
INFOCOM '90
, pp. 686-693
-
-
Gong, L.1
-
14
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, T. M. A. Lomas, R. M. Needham, and J. H. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5):648-656, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
15
-
-
84945132563
-
Practical password-authenticated key exchange provably secure under standard assumptions
-
Advances in Cryptology - EUROCRYPT 2001, Springer-Verlag
-
J. Katz, R. Ostrovsky, and M. Yung. Practical password-authenticated key exchange provably secure under standard assumptions. In Advances in Cryptology - EUROCRYPT 2001, volume 2045 of LNCS, pages 475-494. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
17
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. of 2004 IEEE Symposium on Security and Privacy, pages 71-85, 2004.
-
(2004)
Proc. of 2004 IEEE Symposium on Security and Privacy
, pp. 71-85
-
-
Laud, P.1
-
18
-
-
0344875574
-
Analysing protocols subject to guessing attacks
-
G. Lowe. Analysing protocols subject to guessing attacks. Journal of Computer Security, 12(1):83-98, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 83-98
-
-
Lowe, G.1
-
19
-
-
0344875571
-
Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
-
D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 99-129
-
-
Micciancio, D.1
Warinschi, B.2
-
20
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Theory of Cryptography Conference (TCC 2004), Springer-Verlag
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Theory of Cryptography Conference (TCC 2004), volume 2951 of LNCS, pages 133-151. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
22
-
-
1442267753
-
A probabilistic polynomial-time calculus for analysis of cryptographic protocols
-
J. Mitchell, A. Ramanathan, A. Scedrov, and V. Teague. A probabilistic polynomial-time calculus for analysis of cryptographic protocols. Electronic Notes in Theoretical Computer Science, 45, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, pp. 45
-
-
Mitchell, J.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
|