-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
28144440505
-
Compositional analysis of contract signing protocols
-
IEEE. To appear
-
M. Backes, A. Datta, A. Derek, J. C. Mitchell, and M. Turuani. Compositional analysis of contract signing protocols. In Proceedings of 18th IEEE Computer Security Foundations Workshop. IEEE, 2005. To appear.
-
(2005)
Proceedings of 18th IEEE Computer Security Foundations Workshop
-
-
Backes, M.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
Turuani, M.5
-
4
-
-
84948957152
-
Public-key encryption in a multi-user setting: Security proofs and improvements
-
M. Bellare, A. Boldyreva, and S. Micali. Public-key encryption in a multi-user setting: Security proofs and improvements. In Advances in Cryptology - EUROCRYPT 2000, Proceedings, pages 259-274, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000, Proceedings
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
6
-
-
24644437051
-
Computationally sound, automated proofs for security protocols
-
Lecture Notes in Computer Science. Springer-Verlag
-
V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols. In Proceedings of 14th European Symposium on Programming (ESOP'05), Lecture Notes in Computer Science, pages 157-171. Springer-Verlag, 2005.
-
(2005)
Proceedings of 14th European Symposium on Programming (ESOP'05)
, pp. 157-171
-
-
Cortier, V.1
Warinschi, B.2
-
7
-
-
34548864135
-
A derivation system for security protocols and its logical formalization
-
IEEE
-
A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. A derivation system for security protocols and its logical formalization. In Proceedings of 16th IEEE Computer Security Foundations Workshop, pages 109-125. IEEE, 2003.
-
(2003)
Proceedings of 16th IEEE Computer Security Foundations Workshop
, pp. 109-125
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
10
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
N. Durgin, J. C. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, 11:677-721, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.C.2
Pavlovic, D.3
-
14
-
-
24644476184
-
Completing the picture: Soundness of formal encryption in the presence of active adversaries
-
Lecture Notes in Computer Science. Springer-Verlag
-
R. Janvier, L. Mazare, and Y. Lakhnech. Completing the picture: Soundness of formal encryption in the presence of active adversaries. In Proceedings of 14th European Symposium on Programming (ESOP'05), Lecture Notes in Computer Science, pages 172-185. Springer-Verlag, 2005.
-
(2005)
Proceedings of 14th European Symposium on Programming (ESOP'05)
, pp. 172-185
-
-
Janvier, R.1
Mazare, L.2
Lakhnech, Y.3
-
15
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Theory of Cryptography Conference - Proceedings of TCC 2004, Springer-Verlag
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Theory of Cryptography Conference - Proceedings of TCC 2004, volume 2951 of Lecture Notes in Computer Science, pages 133-151. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
16
-
-
0022659563
-
Probabilistic logic
-
N. J. Nilsson. Probabilistic logic. Artificial Intelligence, 28(1):71-87, 1986.
-
(1986)
Artificial Intelligence
, vol.28
, Issue.1
, pp. 71-87
-
-
Nilsson, N.J.1
-
17
-
-
0004023090
-
On formal models for secure key exchange (version 4)
-
IBM Research
-
V. Shoup. On formal models for secure key exchange (version 4). Technical Report RZ 3120, IBM Research, 1999.
-
(1999)
Technical Report
, vol.RZ 3120
-
-
Shoup, V.1
-
18
-
-
84942255620
-
A computational analysis of the Needham-Schroeder(-Lowe) protocol
-
ACM Press
-
B. Warinschi. A computational analysis of the Needham-Schroeder(-Lowe) protocol. In Proceedings of 16th Computer Science Foundation Workshop, pages 248-262. ACM Press, 2003.
-
(2003)
Proceedings of 16th Computer Science Foundation Workshop
, pp. 248-262
-
-
Warinschi, B.1
|