메뉴 건너뛰기




Volumn 3580, Issue , 2005, Pages 652-663

Computationally sound implementations of equational theories against passive adversaries

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATA THEORY; COMPUTATIONAL METHODS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 26444541858     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11523468_53     Document Type: Conference Paper
Times cited : (47)

References (14)
  • 3
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Proc. 1st IFIP International Conference on Theoretical Computer Science (IFIP-TCS'00)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Proc. 1st IFIP International Conference on Theoretical Computer Science (IFIP-TCS'00), volume 1872 of LNCS, pages 3-22, 2000.
    • (2000) LNCS , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 7
    • 26444482575 scopus 로고    scopus 로고
    • Computationally sound implementations of equational theories against passive adversaries
    • Cryptology ePrint Archive, Mar. 28 pages
    • M. Baudet, V. Cortier, and S. Kremer. Computationally sound implementations of equational theories against passive adversaries. Research Report 2005/074, Cryptology ePrint Archive, Mar. 2005. 28 pages.
    • (2005) Research Report , vol.2005 , Issue.74
    • Baudet, M.1    Cortier, V.2    Kremer, S.3
  • 11
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. IEEE Symposium on Security and Privacy (SSP'04), pages 71-85, 2004.
    • (2004) Proc. IEEE Symposium on Security and Privacy (SSP'04) , pp. 71-85
    • Laud, P.1
  • 12
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
    • D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-129
    • Micciancio, D.1    Warinschi, B.2
  • 13
    • 26444517444 scopus 로고    scopus 로고
    • About the security of ciphers (semantic security and pseudorandom permutations)
    • Proc. Selected Areas in Cryptography (SAC'04)
    • D.H. Phan and D. Pointcheval. About the security of ciphers (semantic security and pseudorandom permutations). In Proc. Selected Areas in Cryptography (SAC'04), volume 3357 of LNCS, pages 185-200, 2004.
    • (2004) LNCS , vol.3357 , pp. 185-200
    • Phan, D.H.1    Pointcheval, D.2
  • 14
    • 35048877679 scopus 로고    scopus 로고
    • On the notion of pseudo-free groups
    • Proc. 1st Theory of Cryptography Conference (TCC'04)
    • R.L. Rivest. On the notion of pseudo-free groups. In Proc. 1st Theory of Cryptography Conference (TCC'04), volume 2951 of LNCS, pages 505-521, 2004.
    • (2004) LNCS , vol.2951 , pp. 505-521
    • Rivest, R.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.