-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1): 1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
84879078812
-
Reconciling two views of cryptography: The computational soundness of formal encryption
-
Proc. 1st IFIP International Conference on Theoretical Computer Science. Springer
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP International Conference on Theoretical Computer Science, volume 1872 of LNCS, pages 3-22. Springer, 2000.
-
(2000)
LNCS
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
23044520204
-
State of the art in electronic payment systems
-
N. Asokan, P. Janson, M. Steiner, and M. Waidner. State of the art in electronic payment systems. Advances in Computers, 43:425-449, 2000.
-
(2000)
Advances in Computers
, vol.43
, pp. 425-449
-
-
Asokan, N.1
Janson, P.2
Steiner, M.3
Waidner, M.4
-
5
-
-
35048863550
-
A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
-
Proc. 9th European Symposium on Research in Computer Security (ESORICS). Springer
-
M. Backes. A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol. In Proc. 9th European Symposium on Research in Computer Security (ESORICS), volume 3193 of LNCS, pages 89-108. Springer, 2004.
-
(2004)
LNCS
, vol.3193
, pp. 89-108
-
-
Backes, M.1
-
6
-
-
35248899328
-
Cryptographically sound and machine-assisted verification of security protocols
-
Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS). Springer
-
M. Backes and C. Jacobi. Cryptographically sound and machine-assisted verification of security protocols. In Proc. 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS), volume 2607 of LNCS, pages 675-686. Springer, 2003.
-
(2003)
LNCS
, vol.2607
, pp. 675-686
-
-
Backes, M.1
Jacobi, C.2
-
8
-
-
1442292329
-
A composable cryptographic library with nested operations
-
Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003
-
M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
10
-
-
33746365751
-
Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4(2):75-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
11
-
-
84944035753
-
Formal verification of cardholder registration in SET
-
Proc. 6th European Symposium on Research in Computer Security (ESORICS). Springer
-
G. Bella, F. Massacci, L. C. Paulson, and P. Tramontano. Formal verification of cardholder registration in SET. In Proc. 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of LNCS, pages 159-174. Springer, 2000.
-
(2000)
LNCS
, vol.1895
, pp. 159-174
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
Tramontano, P.4
-
13
-
-
0033731024
-
Design, implementation and deployment of the iKP secure electronic payment system
-
M. Bellare, J. A. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, E. V. Herreweghen, and M. Waidner. Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications, 18(4):611-627, 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 611-627
-
-
Bellare, M.1
Garay, J.A.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Herreweghen, E.V.8
Waidner, M.9
-
14
-
-
84964476742
-
IKP - A family of secure electronic payment protocols
-
M. Bellare, J. A. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, and M. Waidner. iKP - A family of secure electronic payment protocols. In Proceedings of the First Usenix Workshop on Electronic Commerce, 1995.
-
(1995)
Proceedings of the First Usenix Workshop on Electronic Commerce
-
-
Bellare, M.1
Garay, J.A.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Waidner, M.8
-
15
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology: CRYPTO '93. Springer
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology: CRYPTO '93, volume 773 of LNCS, pages 232-249. Springer, 1994.
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
19
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 3(1): 143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.3
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
20
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Extended version in Cryptology ePrint Archive, Report 2000/67
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pages 136-145, 2001. Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.
-
(2001)
Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 136-145
-
-
Canetti, R.1
-
21
-
-
0031619016
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In Proc. 30th Annual ACM Symposium on Theory of Computing (STOC), pages 209-218, 1998.
-
(1998)
Proc. 30th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
22
-
-
24344464253
-
Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange)
-
R. Canetti and J. Herzog. Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange). Cryptology ePrint Archive, Report 2004/334, 2004. http://eprint. iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.334
-
-
Canetti, R.1
Herzog, J.2
-
23
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology: CRYPTO'82, pages 199-203, 1983.
-
(1983)
Advances in Cryptology: CRYPTO'82
, pp. 199-203
-
-
Chaum, D.1
-
24
-
-
0022145479
-
Security without identification: Transaction systems to make Big Brother obsolete
-
D. Chaum. Security without identification: Transaction systems to make Big Brother obsolete. Communications of the ACM, 28:1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
25
-
-
26444601400
-
Online cash checks
-
Advances in Cryptology: EUROCRYPT'89
-
D. Chaum. Online cash checks. In Advances in Cryptology: EUROCRYPT'89, volume 434 of LNCS, pages 288-293, 1989.
-
(1989)
LNCS
, vol.434
, pp. 288-293
-
-
Chaum, D.1
-
26
-
-
85028762150
-
Efficient offline electronic checks
-
Advances in Cryptology: EUROCRYPT'89
-
D. Chaum, B. den Boer, E. van Heyst, S. F. Mjolsnes, and A. Steenbeek. Efficient offline electronic checks (extended abstract). In Advances in Cryptology: EUROCRYPT'89, volume 434 of LNCS, pages 294-301, 1989.
-
(1989)
LNCS
, vol.434
, pp. 294-301
-
-
Chaum, D.1
Den Boer, B.2
Van Heyst, E.3
Mjolsnes, S.F.4
Steenbeek, A.5
-
27
-
-
84929273746
-
Untraceable electronic cash
-
Advances in Cryptology: CRYPTO'88
-
D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Advances in Cryptology: CRYPTO'88, volume 403 of LNCS, pages 319-327, 1988.
-
(1988)
LNCS
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
28
-
-
84921069195
-
New generation of secure and practical RSA-based signatures
-
Advances in Cryptology: CRYPTO '96. Springer
-
R. Cramer and I. Damgård. New generation of secure and practical RSA-based signatures, In Advances in Cryptology: CRYPTO '96, volume 1109 of LNCS, pages 173-185. Springer, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 173-185
-
-
Cramer, R.1
Damgård, I.2
-
30
-
-
0010250829
-
An efficient existentially unforgeable signature scheme and its applications
-
C. Dwork and M. Naor. An efficient existentially unforgeable signature scheme and its applications. Journal of Cryptology, 11 (3):187-208, 1998.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.3
, pp. 187-208
-
-
Dwork, C.1
Naor, M.2
-
32
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Advances in Cryptology: CRYPTO '90, Springer
-
S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Advances in Cryptology: CRYPTO '90, volume 537 of LNCS, pages 77-93. Springer, 1990.
-
(1990)
LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
34
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
36
-
-
35248848005
-
Plaintext awareness via key registration
-
Advances in Cryptology: CRYPTO 2003. Springer
-
J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In Advances in Cryptology: CRYPTO 2003, volume 2729 of LNCS, pages 548-564. Springer, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 548-564
-
-
Herzog, J.1
Liskov, M.2
Micali, S.3
-
38
-
-
0029210095
-
Reasoning about accountability in protocols for electronic commerce
-
R. Kailar. Reasoning about accountability in protocols for electronic commerce. In Proc. 16th IEEE Symposium on Security & Privacy, pages 236-250, 1995.
-
(1995)
Proc. 16th IEEE Symposium on Security & Privacy
, pp. 236-250
-
-
Kailar, R.1
-
39
-
-
0024665744
-
Analyzing encryption protocols using formal verification techniques
-
R. Kemmerer. Analyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448-457, 1989.
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.1
-
40
-
-
84958771467
-
A sound logic for analysing electronic commerce protocols
-
Proc. 5th European Symposium on Research in Computer Security (ESORICS). Springer
-
V. Kessler and H. Neumann. A sound logic for analysing electronic commerce protocols. In Proc. 5th European Symposium on Research in Computer Security (ESORICS), volume 1485 of LNCS, pages 345-360. Springer, 1998.
-
(1998)
LNCS
, vol.1485
, pp. 345-360
-
-
Kessler, V.1
Neumann, H.2
-
41
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
-
(2001)
Proc. 10th European Symposium on Programming (ESOP)
, pp. 77-91
-
-
Laud, P.1
-
42
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Proc. 5th ACM Conference on Computer and Communications Security, pages 112-121, 1998.
-
(1998)
Proc. 5th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
44
-
-
0024665570
-
Using narrowing in the analysis of key management protocols
-
C. Meadows. Using narrowing in the analysis of key management protocols. In Proc. 10th IEEE Symposium on Security & Privacy, pages 138-147, 1989.
-
(1989)
Proc. 10th IEEE Symposium on Security & Privacy
, pp. 138-147
-
-
Meadows, C.1
-
45
-
-
84958035071
-
A formal specification of requirements for payment transactions in the SET protocol
-
Proc. 2nd Financial Cryptography Conference (FC). Springer
-
C. Meadows and P. Syverson. A formal specification of requirements for payment transactions in the SET protocol. In Proc. 2nd Financial Cryptography Conference (FC), volume 1465 of LNCS, pages 122-140. Springer, 1998.
-
(1998)
LNCS
, vol.1465
, pp. 122-140
-
-
Meadows, C.1
Syverson, P.2
-
46
-
-
84974655726
-
Secure computation
-
Advances in Cryptology: CRYPTO '91. Springer
-
S. Micali and P. Rogaway. Secure computation. In Advances in Cryptology: CRYPTO '91, volume 576 of LNCS, pages 392-404. Springer, 1991.
-
(1991)
LNCS
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
47
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Proc. 1st Theory of Cryptography Conference (TCC). Springer
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 2951 of LNCS, pages 133-151. Springer, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
48
-
-
0021190844
-
The interrogator: A tool for cryptographic protocol security
-
J. K. Millen. The interrogator: A tool for cryptographic protocol security. In Proc. 5th IEEE Symposium on Security & Privacy, pages 134-141, 1984.
-
(1984)
Proc. 5th IEEE Symposium on Security & Privacy
, pp. 134-141
-
-
Millen, J.K.1
-
50
-
-
0345280512
-
A probabilistic polynominal-time process calculus for analysis of cryptographic protocols (preliminary report)
-
J. Mitchell, M. Mitchell, A. Scedrov, and V. Teague. A probabilistic polynominal-time process calculus for analysis of cryptographic protocols (preliminary report). Electronic Notes in Theoretical Computer Science, 47:1-31, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.47
, pp. 1-31
-
-
Mitchell, J.1
Mitchell, M.2
Scedrov, A.3
Teague, V.4
-
51
-
-
85024576592
-
Universal electronic cash
-
Advances in Cryptology: CRYPTO '91. Springer
-
T. Okamoto and K. Ohta. Universal electronic cash. In Advances in Cryptology: CRYPTO '91, volume 576 of LNCS, pages 324-337. Springer, 1992.
-
(1992)
LNCS
, vol.576
, pp. 324-337
-
-
Okamoto, T.1
Ohta, K.2
-
52
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85-128, 1998.
-
(1998)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.1
-
53
-
-
84957699896
-
How to break another "provably secure" payment system
-
Advances in Cryptology: EUROCRYPT '95. Springer
-
B. Pfitzmann, M. Schunter, and M. Waidner. How to break another "provably secure" payment system. In Advances in Cryptology: EUROCRYPT '95, volume 921 of LNCS, pages 121-132. Springer, 1995.
-
(1995)
LNCS
, vol.921
, pp. 121-132
-
-
Pfitzmann, B.1
Schunter, M.2
Waidner, M.3
-
54
-
-
84964980361
-
How to break and repair a "provably secure" untraceable payment system
-
Advances in Cryptology: CRYPTO '91. Springer
-
B. Pfitzmann and M. Waidner. How to break and repair a "provably secure" untraceable payment system. In Advances in Cryptology: CRYPTO '91, volume 576 of LNCS, pages 338-350. Springer, 1992.
-
(1992)
LNCS
, vol.576
, pp. 338-350
-
-
Pfitzmann, B.1
Waidner, M.2
-
56
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001. Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082.
-
(2001)
Proc. 22nd IEEE Symposium on Security & Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
57
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D. X. Song, S. Berezin, and A. Perrig. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(1/2):47-74, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.X.1
Berezin, S.2
Perrig, A.3
|