메뉴 건너뛰기




Volumn , Issue , 2005, Pages 171-182

Relating symbolic and cryptographic secrecy

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC SECRECY; KNOWLEDGE SET; SECRECY VIOLATIONS;

EID: 27544482135     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2005.17     Document Type: Conference Paper
Times cited : (20)

References (30)
  • 3
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography: The computational soundness of formal encryption
    • Proc. 1st IFIP International Conference on Theoretical Computer Science, Springer
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP International Conference on Theoretical Computer Science, volume 1872 of Lecture Notes in Computer Science, pages 3-22. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 35048863550 scopus 로고    scopus 로고
    • A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
    • Proc. 9th European Symposium on Research in Computer Security (ESORICS), Springer
    • M. Backes. A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol. In Proc. 9th European Symposium on Research in Computer Security (ESORICS), volume 3193 of Lecture Notes in Computer Science, pages 89-108. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3193 , pp. 89-108
    • Backes, M.1
  • 5
    • 35248899328 scopus 로고    scopus 로고
    • Cryptographically sound and machine-assisted verification of security protocols
    • Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS), Springer
    • M. Backes and C. Jacobi. Cryptographically sound and machine-assisted verification of security protocols. In Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS), volume 2607 of Lecture Notes in Computer Science, pages 675-686. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2607 , pp. 675-686
    • Backes, M.1    Jacobi, C.2
  • 6
    • 84957037045 scopus 로고    scopus 로고
    • Computational probabilistic non-interference
    • Proc. 7th European Symposium on Research in Computer Security (ESORICS), Springer
    • M. Backes and B. Pfitzmann. Computational probabilistic non-interference. In Proc. 7th European Symposium on Research in Computer Security (ESORICS), volume 2502 of Lecture Notes in Computer Science, pages 1-23. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2502 , pp. 1-23
    • Backes, M.1    Pfitzmann, B.2
  • 7
    • 35248896750 scopus 로고    scopus 로고
    • A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol
    • Full version in IACR Cryptology ePrint Archive 2003/121, Jun. 2003
    • M. Backes and B. Pfitzmann. A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. In Proc. 23rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), pages 1-12, 2003. Full version in IACR Cryptology ePrint Archive 2003/121, Jun. 2003, http://eprint.iacr.org/.
    • (2003) Proc. 23rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS) , pp. 1-12
    • Backes, M.1    Pfitzmann, B.2
  • 9
    • 4944234643 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
    • Full version in IACR Cryptology ePrint Archive 2004/059, Feb. 2004
    • M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In Proc. 17th IEEE Computer Security Foundations Workshop (CSFW), 2004. Full version in IACR Cryptology ePrint Archive 2004/059, Feb. 2004, http://eprint.iacr.org/.
    • (2004) Proc. 17th IEEE Computer Security Foundations Workshop (CSFW)
    • Backes, M.1    Pfitzmann, B.2
  • 11
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations
    • Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003.
    • M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003. http://eprint.iacr.org/.
    • (2003) Proc. 10th ACM Conference on Computer and Communications Security , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 12
    • 0142250274 scopus 로고    scopus 로고
    • Symmetric authentication within a simulatable cryptographic library
    • Proc. 8th European Symposium on Research in Computer Security (ESORICS), Springer, Extended version in IACR Cryptology ePrint Archive 2003/145, Jul. 2003
    • M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In Proc. 8th European Symposium on Research in Computer Security (ESORICS), volume 2808 of Lecture Notes in Computer Science, pages 271-290. Springer, 2003. Extended version in IACR Cryptology ePrint Archive 2003/145, Jul. 2003, http://eprint.iacr.org/.
    • (2003) Lecture Notes in Computer Science , vol.2808 , pp. 271-290
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 13
    • 35048854169 scopus 로고    scopus 로고
    • A general composition theorem for secure reactive systems
    • Proc. 1st Theory of Cryptography Conference (TCC), Springer
    • M. Backes, B. Pfitzmann, and M. Waidner. A general composition theorem for secure reactive systems. In Proc. 1st Theory of Cryptography Conference (TCC), volume 2951 of Lecture Notes in Computer Science, pages 336-354. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 336-354
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 14
    • 24344464253 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange)
    • R. Canetti and J. Herzog. Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange). Cryptology ePrint Archive, Report 2004/334, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.334
    • Canetti, R.1    Herzog, J.2
  • 17
    • 35248848005 scopus 로고    scopus 로고
    • Plaintext awareness via key registration
    • Advances in Cryptology: CRYPTO 2003, Springer
    • J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In Advances in Cryptology: CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 548-564. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 548-564
    • Herzog, J.1    Liskov, M.2    Micali, S.3
  • 18
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 19
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
    • (2001) Proc. 10th European Symposium on Programming (ESOP) , pp. 77-91
    • Laud, P.1
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Springer
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 22
    • 0024665570 scopus 로고
    • Using narrowing in the analysis of key management protocols
    • C. Meadows. Using narrowing in the analysis of key management protocols. In Proc. 10th IEEE Symposium on Security & Privacy, pages 138-147, 1989.
    • (1989) Proc. 10th IEEE Symposium on Security & Privacy , pp. 138-147
    • Meadows, C.1
  • 23
    • 0004256761 scopus 로고
    • PhD thesis, Georgia Institute of Technology
    • M. Merritt. Cryptographic Protocols. PhD thesis, Georgia Institute of Technology, 1983.
    • (1983) Cryptographic Protocols
    • Merritt, M.1
  • 24
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proc. 1st Theory of Cryptography Conference (TCC), Springer
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 2951 of Lecture Notes in Computer Science, pages 133-151. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 25
    • 0021190844 scopus 로고
    • The interrogator: A tool for cryptographic protocol security
    • J. K. Millen. The interrogator: A tool for cryptographic protocol security. In Proc. 5th IEEE Symposium on Security & Privacy, pages 134-141, 1984.
    • (1984) Proc. 5th IEEE Symposium on Security & Privacy , pp. 134-141
    • Millen, J.K.1
  • 26
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85-128, 1998.
    • (1998) Journal of Cryptology , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.1
  • 27
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001. Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082, http://eprint.iacr.org/.
    • (2001) Proc. 22nd IEEE Symposium on Security & Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.