-
1
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS), Sendai, Japan. Springer
-
M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS), volume 2215 of LNCS, pages 82-94, Sendai, Japan, 2001. Springer.
-
(2001)
LNCS
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Preliminary version presented at IFIP TCS 2000
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002. Preliminary version presented at IFIP TCS 2000.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
1442292329
-
A composable cryptographic library with nested operations
-
Washington D.C., USA, ACM Press. Full version available at IACR ePrint Archive, Report 2003/015, January 2003
-
M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations. In Proc. 10th ACM Conference on Computer and Communications Security (CCS), pages 220-230, Washington D.C., USA, 2003. ACM Press. Full version available at IACR ePrint Archive, Report 2003/015, January 2003.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security (CCS)
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
4
-
-
26444574431
-
-
PhD thesis, University of Pennsylvania, Also available at IACR ePrint Archive
-
G. Bana. Soundness and Completeness of Formal Logics of Symmetric Encryption. PhD thesis, University of Pennsylvania, 2004. Available at www.math.upenn.edu/~bana/banaphdthesis.pdf. Also available at IACR ePrint Archive.
-
(2004)
Soundness and Completeness of Formal Logics of Symmetric Encryption
-
-
Bana, G.1
-
5
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Las Vegas, NV, USA, IEEE Computer Society. Full version available at IACR ePrint Archive, Report 2000/067
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pages 136-145, Las Vegas, NV, USA, 2001. IEEE Computer Society. Full version available at IACR ePrint Archive, Report 2000/067.
-
(2001)
42nd IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 136-145
-
-
Canetti, R.1
-
6
-
-
24644437051
-
Computationally sound, automated proofs for security protocols
-
Proc. 14th European Symposium on Programming (ESOP), Edinburgh, UK, Springer.
-
V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols. In Proc. 14th European Symposium on Programming (ESOP), volume 3444 of LNCS, pages 157-171, Edinburgh, UK, 2005. Springer.
-
(2005)
LNCS
, vol.3444
, pp. 157-171
-
-
Cortier, V.1
Warinschi, B.2
-
7
-
-
0020720357
-
On the security of public-key protocols
-
Preliminary version presented at FOCS'81
-
D. Dolev and A. C. Yao. On the security of public-key protocols. IEEE Transactions on Information Theory, 29(2):198-208, 1983. Preliminary version presented at FOCS'81.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
8
-
-
0021409284
-
Probabilistic encryption
-
Preliminary version presented at STOC'82
-
S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and Systems Sciences, 28(2):270-299, 1984. Preliminary version presented at STOC'82.
-
(1984)
Journal of Computer and Systems Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
10
-
-
35248848005
-
Plaintext awareness via key registration
-
Advances in Cryptology - CRYPTO 2003, Santa Barbara, CA, USA. Springer
-
J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 548-564, Santa Barbara, CA, USA, 2003. Springer.
-
(2003)
LNCS
, vol.2729
, pp. 548-564
-
-
Herzog, J.1
Liskov, M.2
Micali, S.3
-
11
-
-
24144446250
-
Weak key authenticity and the computational completeness of formal encryption
-
Advances in Cryptology - CRYPTO 2003, Santa Barbara, CA, USA. Springer
-
O. Horvitz and V. Gligor. Weak key authenticity and the computational completeness of formal encryption. In Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 530-547, Santa Barbara, CA, USA, 2003. Springer.
-
(2003)
LNCS
, vol.2729
, pp. 530-547
-
-
Horvitz, O.1
Gligor, V.2
-
12
-
-
24644476184
-
Completing the picture: Soundness of formal encryption in the presence of active adversaries
-
Proc. 14th European Symposium on Programming (ESOP), Edinburgh, UK. Springer
-
R. Janvier, Y. Lakhnech, and L. Mazaré. Completing the picture: Soundness of formal encryption in the presence of active adversaries. In Proc. 14th European Symposium on Programming (ESOP), volume 3444 of LNCS, pages 172-185, Edinburgh, UK, 2005. Springer.
-
(2005)
LNCS
, vol.3444
, pp. 172-185
-
-
Janvier, R.1
Lakhnech, Y.2
Mazaré, L.3
-
13
-
-
28144443023
-
Encryption cycles and two views of cryptography
-
Karlstad, Sweden, Karlstad University Studies
-
P. Laud. Encryption cycles and two views of cryptography. In Proc. 7th Nordic Workshop on Secure IT Systems, number 31, pages 85-100, Karlstad, Sweden, 2002. Karlstad University Studies.
-
(2002)
Proc. 7th Nordic Workshop on Secure IT Systems
, vol.31
, pp. 85-100
-
-
Laud, P.1
-
14
-
-
35048855625
-
Sound computational interpretation of formal encryption with composed keys
-
Proc. 6th International Conference on Information Security and Cryptology (ICISC), Seoul, Korea. Springer
-
P. Laud and R. Corin. Sound computational interpretation of formal encryption with composed keys. In Proc. 6th International Conference on Information Security and Cryptology (ICISC), volume 2971 of LNCS, pages 55-66, Seoul, Korea, 2003. Springer.
-
(2003)
LNCS
, vol.2971
, pp. 55-66
-
-
Laud, P.1
Corin, R.2
-
15
-
-
0032218226
-
A probabilistic polynomial-time framework for protocol analysis
-
San Francisco, CA, USA. ACM Press
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic polynomial-time framework for protocol analysis. In Proc. 5th ACM Conference on Computer and Communications Security (CCS), pages 112-121, San Francisco, CA, USA, 1998. ACM Press.
-
(1998)
Proc. 5th ACM Conference on Computer and Communications Security (CCS)
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
16
-
-
84947240143
-
Indistinguishability of random systems
-
Advances in Cryptology - EUROCRYPT 2002, Amsterdam, The Netherlands. Springer
-
U. Maurer. Indistinguishability of random systems. In Advances in Cryptology - EUROCRYPT 2002, volume 2332 of LNCS, pages 110-132, Amsterdam, The Netherlands, 2002. Springer.
-
(2002)
LNCS
, vol.2332
, pp. 110-132
-
-
Maurer, U.1
-
17
-
-
24144482305
-
Adaptive security of symbolic encryption
-
Proc. 2nd Theory of Cryptography Conference (TCC), Cambridge, MA, USA. Springer
-
D. Micciancio and S. Panjwani. Adaptive security of symbolic encryption. In Proc. 2nd Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 169-187, Cambridge, MA, USA, 2005. Springer.
-
(2005)
LNCS
, vol.3378
, pp. 169-187
-
-
Micciancio, D.1
Panjwani, S.2
-
18
-
-
0344875571
-
Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
-
Preliminary version presented at WITS'02
-
D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-130, 2004. Preliminary version presented at WITS'02.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 99-130
-
-
Micciancio, D.1
Warinschi, B.2
-
19
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Proc. 1st Theory of Cryptography Conference (TCC), Cambridge, MA, USA. Springer
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 2951 of LNCS, pages 133-151, Cambridge, MA, USA, 2004. Springer.
-
(2004)
LNCS
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
20
-
-
84942255620
-
A computational analysis of the Needham-Schroeder protocol
-
Pacific Grove, CA, USA. IEEE Computer Society
-
B. Warinschi. A computational analysis of the Needham-Schroeder protocol. In Proc. 16th IEEE Computer Security Foundations Workshop (CSFW), pages 248-262, Pacific Grove, CA, USA, 2003. IEEE Computer Society.
-
(2003)
Proc. 16th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 248-262
-
-
Warinschi, B.1
-
21
-
-
0020301290
-
Theory and applications of trapdoor functions
-
Chicago, IL, USA. IEEE Computer Society
-
A. C. Yao. Theory and applications of trapdoor functions. In 23rd IEEE Symposium on Foundations of Computer Science (FOCS), pages 80-91, Chicago, IL, USA, 1982. IEEE Computer Society.
-
(1982)
23rd IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 80-91
-
-
Yao, A.C.1
|