-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology, 15(2):103-127, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
35048854169
-
A general composition theorem for secure reactive systems
-
Proc. 1st Theory of Cryptography Conference (TCC). Springer-Verlag
-
M. Backes, B. Pfitzmann, and M. Waidner, A general composition theorem for secure reactive systems. In Proc. 1st Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 336-354. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3378
, pp. 336-354
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
5
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. J. Cryptology, 4(2):75-122, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
7
-
-
84945119254
-
Entity authentication and key distribution
-
Springer-Verlag
-
M. Bellare and P. Rogaway. Entity authentication and key distribution, In Proc. Advances in Cryptology - CRYPTO 1993, volume 773, pages 232-249. Springer-Verlag, 1993.
-
(1993)
Proc. Advances in Cryptology - CRYPTO 1993
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
85016462400
-
Systematic design of two-party authentication protocols
-
Proc. Advances in Cryptology CRYPTO 1991. Springer-Verlag
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutton, R. Molva, and M. Yung. Systematic design of two-party authentication protocols. In Proc. Advances in Cryptology CRYPTO 1991, volume 576 of LNCS, pages 44-61. Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.576
, pp. 44-61
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutton, S.5
Molva, R.6
Yung, M.7
-
11
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. J. Cryptology, 13(1): 143-202, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
12
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE
-
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols, In Proc. 42nd Annual Symposium on Foundations of Computer Science (FOCS), pages 136-145. IEEE, 2001. Full version at http://eprint.iacr.org/2000/067.
-
(2001)
Proc. 42nd Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 136-145
-
-
Canetti, R.1
-
13
-
-
4944266340
-
Universally composable signature, certification, and authentication
-
IEEE
-
R. Canetti. Universally composable signature, certification, and authentication. In Proc. 17th IEEE Computer Security Foundations Workshop (CSFW), pages 219-233. IEEE, 2004. Full version at http://eprint.iacr.org/2003/ 329.
-
(2004)
Proc. 17th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 219-233
-
-
Canetti, R.1
-
15
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Proc. Advances in Cryptology - EUROCRYPT 2001. Springer-Verlag
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Proc. Advances in Cryptology - EUROCRYPT 2001, volume 2045 of LNCS, pages 453-474. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
16
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
Proc. Advances in Cryptology - EUROCRYPT 2002. Springer-Verlag
-
R. Canetti and H. Krawczyk. Universally composable notions of key exchange and secure channels. In Proc. Advances in Cryptology - EUROCRYPT 2002, volume 2332 of LNCS, pages 337-351. Springer-Verlag, 2002. Full version at http://eprint.iacr.org/2002/059.
-
(2002)
LNCS
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
17
-
-
35248819315
-
Universal composition with joint state
-
Proc. Advances in Cryptology - CRYPTO 2003. Springer-Verlag
-
R. Canetti and T. Rabin. Universal composition with joint state. In Proc. Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 265-281. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 265-281
-
-
Canetti, R.1
Rabin, T.2
-
18
-
-
24644437051
-
Computationally sound, automated proofs for security protocols
-
Proc. 14th European Symposium on Programming (ESOP). Springer-Verlag
-
V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols, In Proc. 14th European Symposium on Programming (ESOP), volume 3444 of LNCS, pages 157-171. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3444
, pp. 157-171
-
-
Cortier, V.1
Warinschi, B.2
-
19
-
-
34548864135
-
A derivation system for security protocols and its logical formalization
-
IEEE
-
A. Datta, A. Derek, J.C. Mitchell, and D. Pavlovic. A derivation system for security protocols and its logical formalization, In Proc. 16th IEEE Computer Security Foundations Workshop (CSFW), pages 109-125. IEEE, 2003.
-
(2003)
Proc. 16th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 109-125
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
20
-
-
33749572154
-
Probabilistic polynomial-time semantics for a protocol security logic
-
to appear
-
A. Datta, A. Derek, J.C. Mitchell, V. Shmatikov, and M. Turuani. Probabilistic polynomial-time semantics for a protocol security logic. In Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP) - to appear, 2005.
-
(2005)
Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP)
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Shmatikov, V.4
Turuani, M.5
-
21
-
-
0003286492
-
The TLS protocol version 1.0
-
January
-
T. Dierks and C. Allen. The TLS protocol Version 1.0. Internet RFC: http://www.ietf.org/rfc/rfc2246.txt, January 1999.
-
(1999)
Internet RFC
-
-
Dierks, T.1
Allen, C.2
-
22
-
-
1542593353
-
Authentication and authenticated key exchange
-
W. Diffie, P. van Oorschot, and M. Wiener. Authentication and authenticated key exchange. Designs, Code, and Cryptography, 2(2):107-125, 1992.
-
(1992)
Designs, Code, and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
23
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
N. Durgin, J.C. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. J. Computer Security, 11(4):677-722, 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.4
, pp. 677-722
-
-
Durgin, N.1
Mitchell, J.C.2
Pavlovic, D.3
-
25
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attack
-
S. Goldwasser, S. Micali, and R. Rivest, A digital signature scheme secure against adaptive chosen-message attack. SIAM J. Computing, 17(2):281-308, 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
28
-
-
4944267395
-
Internet key exchange (IKEv2) protocol
-
September
-
C. Kaufman (ed.). Internet key exchange (IKEv2) protocol. Internet draff. http://www.ietf.org/internet-drafts/Neumandraft-ietf-ipsec-ikev2-17.txt, September 2004.
-
(2004)
Internet Draff
-
-
Kaufman, C.1
-
29
-
-
0003237987
-
The Kerberos network authentication service (V5)
-
September
-
J. Kohl and C. Neuman. The Kerberos network authentication service (V5). Internet RFC: http://www.ietf.org/rfc/rfc1510.txt, September 1993.
-
(1993)
Internet RFC
-
-
Kohl, J.1
Neuman, C.2
-
30
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
IEEE
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. IEEE Symposium on Security and Privacy, pages 71-85. IEEE, 2004.
-
(2004)
Proc. IEEE Symposium on Security and Privacy
, pp. 71-85
-
-
Laud, P.1
-
31
-
-
0344875571
-
Completeness theorems for the Abadi-Rogaway language of encrypted expressions
-
D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway language of encrypted expressions. J. Computer Security, 12(1):99-130, 2004.
-
(2004)
J. Computer Security
, vol.12
, Issue.1
, pp. 99-130
-
-
Micciancio, D.1
Warinschi, B.2
-
32
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Proc. 1st Theory of Cryptography Conference (TCC). Springer-Verlag
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 133-151. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3378
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
33
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
IEEE
-
B. Pfitzmann and M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission. In Proc. IEEE Symposium on Security and Privacy, pages 184-200. IEEE, 2001.
-
(2001)
Proc. IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
35
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F. Thayer, J. Herzog, and J. Guttman, Strand spaces: proving security protocols correct. J. Computer Security, 7(1), 1999.
-
(1999)
J. Computer Security
, vol.7
, Issue.1
-
-
Thayer, F.1
Herzog, J.2
Guttman, J.3
|