-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2) (2002), 103-127.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
84937407919
-
Deriving cryptographically sound implementations using composition and formally verified bisimulation
-
Formal Methods Europe '02 (PME), Springer
-
M. Backes, C. Jacobi and B. Pfitzmann, Deriving cryptographically sound implementations using composition and formally verified bisimulation, in: Formal Methods Europe '02 (PME), Volume 2391 of LNCS, Springer, 2002, pp. 310-329.
-
(2002)
LNCS
, vol.2391
, pp. 310-329
-
-
Backes, M.1
Jacobi, C.2
Pfitzmann, B.3
-
4
-
-
84947928286
-
Practice-oriented provable security
-
First International Workshop on Information Security (ISW 97), E. Okamoto, G. Davida and M. Mambo, eds., Springer
-
M. Bellare, Practice-oriented provable security, in: First International Workshop on Information Security (ISW 97), E. Okamoto, G. Davida and M. Mambo, eds. Volume 1396 of LNCS, Springer, 1998.
-
(1998)
LNCS
, vol.1396
-
-
Bellare, M.1
-
5
-
-
84983089516
-
The security of cipher block chaining
-
Advances in Cryplology - Crypto 94, Yvo Desmedt, ed., Springer
-
M. Bellare, J. Killian and P. Rogaway, The security of cipher block chaining, in: Advances in Cryplology - Crypto 94, Yvo Desmedt, ed., Volume 839 of LNCS, Springer, 1994.
-
(1994)
LNCS
, vol.839
-
-
Bellare, M.1
Killian, J.2
Rogaway, P.3
-
6
-
-
22344443539
-
Entity authentication and key distribution
-
Springer
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryplology - Crypto '93 Proceedings, Springer, 1993. Full version available at http://www-cse.ucsd.edu/users/mihir/papers/eakd.ps.
-
(1993)
Advances in Cryplology - Crypto '93 Proceedings
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0000523051
-
A logic of authentication
-
M. Burrows, M. Abadi and R. Needham, A logic of authentication, Proceedings of the Royal Society, Series A 426(1871) (1989), 233-271.
-
(1989)
Proceedings of the Royal Society, Series A
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
9
-
-
0003185332
-
-
shortened form, February
-
and, in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
-
10
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Report 2000/067, Internation Association for Crryptographic Research, October 2001. Extended Abstract appeared
-
R. Canetti, Universally composable security: A new paradigm for cryptographic protocols. Report 2000/067, Internation Association for Crryptographic Research, October 2001. Extended Abstract appeared in: Proceedings of the 42nd Symposium on Foundations of Computer Science (FOCS), 2001.
-
(2001)
Proceedings of the 42nd Symposium on Foundations of Computer Science (FOCS)
-
-
Canetti, R.1
-
11
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
LNCS, Springer
-
R. Canetti and H. Krawczyk, Universally composable notions of key exchange and secure channels, in: Eurocrypt 2002, LNCS, Springer, 2002, pp. 337-351.
-
(2002)
Eurocrypt 2002
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
12
-
-
0002378128
-
Optimal privacy and authentication on a portable communications system
-
U. Carlsen, Optimal privacy and authentication on a portable communications system, Operating Systems Review 28(3) (1994), 16-23.
-
(1994)
Operating Systems Review
, vol.28
, Issue.3
, pp. 16-23
-
-
Carlsen, U.1
-
19
-
-
0037076868
-
Authentication tests and the structure of bundles
-
J.D. Guttman and F. Javier Thayer Fábrega, Authentication tests and the structure of bundles, Theoretical Computer Science 283(2) (2002), 333-380.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Fábrega, F.J.T.2
-
20
-
-
0033683193
-
How to prevent type flaw attacks on security protocols
-
IEEE Computer Society Press
-
J. Heather, G. Lowe and S. Schneider, How to prevent type flaw attacks on security protocols, in: Proceedings, 13th Computer Security Foundations Workshop, IEEE Computer Society Press, 2000.
-
(2000)
Proceedings, 13th Computer Security Foundations Workshop
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
21
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proceeedings of TACAS, Springer
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Proceeedings of TACAS, Volume 1055 of Lecture Notes in Computer Science, Springer, 1996, pp. 147-166.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
22
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Computer Society Press
-
G. Lowe, A hierarchy of authentication specifications, in: 10th Computer Security Foundations Workshop Proceedings, IEEE Computer Society Press, 1997, pp. 31-43.
-
(1997)
10th Computer Security Foundations Workshop Proceedings
, pp. 31-43
-
-
Lowe, G.1
-
23
-
-
85063350588
-
A model of computation for the NRL protocol analyzer
-
IEEE, IEEE Computer Society Press
-
C. Meadows, A model of computation for the NRL protocol analyzer, in: Proceedings of the Computer Security Foundations Workshop VII, IEEE, IEEE Computer Society Press, 1994, pp. 84-89.
-
(1994)
Proceedings of the Computer Security Foundations Workshop VII
, pp. 84-89
-
-
Meadows, C.1
-
25
-
-
0023247970
-
Efficient and timely mutual authentication
-
D. Otway and O. Rees, Efficient and timely mutual authentication, Operating Systems Review 21(1) (1987), 8-10.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
26
-
-
0030705795
-
Proving properties of security protocols by induction
-
IEEE Computer Society Press
-
L.C. Paulson, Proving properties of security protocols by induction, in: 10th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 1997, pp. 70-83.
-
(1997)
10th IEEE Computer Security Foundations Workshop
, pp. 70-83
-
-
Paulson, L.C.1
-
27
-
-
0033682447
-
Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
-
IEEE Computer Society Press
-
A. Perrig and D.X. Song, Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2000.
-
(2000)
Proceedings of the 13th IEEE Computer Security Foundations Workshop
-
-
Perrig, A.1
Song, D.X.2
-
30
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
IEEE CS Press, Preprint
-
B. Pfitzmann and M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission, in: Proceedings, 2001 IEEE Symposium on Security and Privacy, IEEE CS Press, 2001. Preprint at http://iacr.org/2000/066.ps.gz.
-
(2001)
Proceedings, 2001 IEEE Symposium on Security and Privacy
-
-
Pfitzmann, B.1
Waidner, M.2
-
32
-
-
3042666549
-
On formal models for secure key exchange
-
(#93166), IBM Research, April. A revised version 4, dated November 15, 1999
-
V. Shoup, On formal models for secure key exchange, Research Report RZ 3120 (#93166), IBM Research, April 1999. A revised version 4, dated November 15, 1999, is available from http://www.shoup.net/papers/.
-
(1999)
Research Report
, vol.RZ 3120
-
-
Shoup, V.1
-
34
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22 (1981), 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|