-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Sept.
-
M. Abadi. Secrecy by Typing in Security Protocols. Journal of the ACM, 46(5):749-786, Sept. 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. Theoretical Computer Science, 298(3):387-413, 2003.
-
(2003)
Theoretical Computer Science
, vol.298
, Issue.3
, pp. 387-413
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
23144463868
-
Analyzing security protcols with secrecy types and logic programs
-
Jan.
-
M. Abadi and B. Blanchet. Analyzing Security Protcols with Secrecy Types and Logic Programs. Journal of the ACM, 52(1):102-146, Jan. 2003.
-
(2003)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
4
-
-
0003092378
-
A Calculus for cryptographic protocols: The spi calculus
-
Jan.
-
M. Abadi and A. Gordon. A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation, 148(1):1-70, Jan. 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
5
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
LNCS 2215
-
M. Abadi and J. Jürjens. Formal Eavesdropping and Its Computational Interpretation. In proc. of TACS 2001 (LNCS 2215), pages 82-94.
-
Proc. of TACS 2001
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
6
-
-
84879078812
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
LNCS 1872
-
M. Abadi and P. Rogaway. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). In proc. of International Conference IFIP TCS 2000 (LNCS 1872) pages 3-22.
-
Proc. of International Conference IFIP TCS 2000
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
7
-
-
35048863550
-
A cryptographically sound Dolev-yao style security proof of the Otway-rees protocol
-
LNCS 3193
-
M. Backes. A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. In proc. of ESORICS 2004 (LNCS 3193) pages 89-108.
-
Proc. of ESORICS 2004
, pp. 89-108
-
-
Backes, M.1
-
8
-
-
35248896750
-
A cryptographically sound security proof of the needham-schroeder-lowe public-key protocol
-
LNCS 2914
-
M. Backes and B. Pfitzmann, A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. In proc. of FST TCS 2003 (LNCS 2914), pages 1-12.
-
Proc. of FST TCS 2003
, pp. 1-12
-
-
Backes, M.1
Pfitzmann, B.2
-
9
-
-
4944234643
-
Symmetric encryption in a simulatable Dolev-yao style cryptographic library
-
M. Backes and B. Pfitzmann. Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. In proc. of IEEE CSFW 2004, pages 204-218.
-
Proc. of IEEE CSFW 2004
, pp. 204-218
-
-
Backes, M.1
Pfitzmann, B.2
-
11
-
-
0142250274
-
Symmetric authentication within a simulatable cryptographic library
-
LNCS 2808
-
M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In proc. of ESORICS 2003 (LNCS 2808), pages 271-290.
-
Proc. of ESORICS 2003
, pp. 271-290
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
13
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption. In proc, of FOCS 1997, pages 394-403.
-
Proc, of FOCS 1997
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
14
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
LNCS 1462
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among Notions of Security for Public-Key Encryption Schemes. In proc of. CRYPTO '98 (LNCS 1462), pages 26-43.
-
Proc Of. CRYPTO '98
, pp. 26-43
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
15
-
-
3543058869
-
Automatic proof of strong secrecy for security protocols
-
B. Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In proc. of IEEE S&P 2004, pages 86-100.
-
Proc. of IEEE S&P 2004
, pp. 86-100
-
-
Blanchet, B.1
-
16
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In proc. of FOCS 2001, pages 136-145.
-
Proc. of FOCS 2001
, pp. 136-145
-
-
Canetti, R.1
-
17
-
-
84880897758
-
Universally composable commitments
-
LNCS 2139
-
R. Canetti and M. Fischlin. Universally Composable Commitments. In proc. of CRYPTO 2001 (LNCS 2139), pages 19-40.
-
Proc. of CRYPTO 2001
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
18
-
-
24344464253
-
Universally composable symbolic analysis of cryptographic protocols (The case of encryption-based mutual authentication and key exchange)
-
22 Feb.
-
R. Canetti and J. Herzog. Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange). Cryptology ePrint Archive: Report 2004/334, 22 Feb. 2005.
-
(2005)
Cryptology EPrint Archive: Report
, vol.2004
, Issue.334
-
-
Canetti, R.1
Herzog, J.2
-
19
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
LNCS 2332
-
R. Canetti and H. Krawczyk, Universally Composable Notions of Key Exchange and Secure Channels. In proc. of EUROCRYPT 2002 (LNCS 2332), pages 337-331.
-
Proc. of EUROCRYPT 2002
, pp. 337-1331
-
-
Canetti, R.1
Krawczyk, H.2
-
21
-
-
24644437051
-
Computationally sound, automated proofs for security protocols
-
LNCS 3444
-
V. Cottier and B. Warinschi. Computationally Sound, Automated Proofs for Security Protocols. In proc. of ESOP 2005 (LNCS 3444), pages 157-171.
-
Proc. of ESOP 2005
, pp. 157-171
-
-
Cottier, V.1
Warinschi, B.2
-
22
-
-
0020720357
-
On the security of public key protocols
-
Mar.
-
D. Dolev and A. Yao. On the security of public key protocols, IEEE Transactions on Information Theory, IT-29(12):198-208, Mar. 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
25
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. D. Gordon and A. Jeffrey. Authenticity by Typing for Security Protocols. Journal of Computer Security, 11(4):431-520, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 431-520
-
-
Gordon, A.D.1
Jeffrey, A.2
-
26
-
-
0038414953
-
Typing correspondence assertions for communication protocols
-
A. D. Gordon and A. Jeffrey, Typing correspondence assertions for communication protocols. Theoretical Computer Science, 300(1-3):379-409.
-
Theoretical Computer Science
, vol.300
, Issue.1-3
, pp. 379-409
-
-
Gordon, A.D.1
Jeffrey, A.2
-
27
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3-4):435-483, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 435-483
-
-
Gordon, A.D.1
Jeffrey, A.2
-
28
-
-
0035750923
-
The faithfulness of abstract protocol analysis: Message authentication
-
J. Guttman, F. Thayer, and L. Zuck. The faithfulness of abstract protocol analysis: message authentication. In proc. of ACM CCS 2001, pages 186-195.
-
Proc. of ACM CCS 2001
, pp. 186-195
-
-
Guttman, J.1
Thayer, F.2
Zuck, L.3
-
30
-
-
24644476184
-
Completing the picture: Soundness of formal encryption in the presence of active adversaries
-
LNCS 3444
-
R. Janvier, Y. Lakhnech, and L. Mazaré. Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries. In proc. of ESOP 2003 (LNCS 3444), pages 172-185.
-
Proc. of ESOP 2003
, pp. 172-185
-
-
Janvier, R.1
Lakhnech, Y.2
Mazaré, L.3
-
31
-
-
33745776339
-
Compositions of cryptographic schemes and their applications to protocols
-
1 Feb.
-
R. Janvier, Y. Lakhnech, and L. Mazaré (De)Compositions of Cryptographic Schemes and their Applications to Protocols. Cryptology ePrint Archive, Report 2005/020, 1 Feb. 2005.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.20
-
-
Janvier, R.1
Lakhnech, Y.2
Mazaré, L.3
-
32
-
-
35248840989
-
Handling encryption in analyses for secure information flow
-
LNCS 2618
-
P. Laud. Handling Encryption in Analyses for Secure Information Flow. In proc. of ESOP 2003 (LNCS 2618), pages 159-173.
-
Proc. of ESOP 2003
, pp. 159-173
-
-
Laud, P.1
-
33
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In proc. of IEEE S&P 2004, pages 71-85.
-
Proc. of IEEE S&P 2004
, pp. 71-85
-
-
Laud, P.1
-
34
-
-
33745777236
-
Secrecy types for a simulatable cryptographic library
-
Cybernetica, Aug.
-
P. Laud. Secrecy Types for a Simulatable Cryptographic Library. Research Report IT-LU-O-162-050823, Cybernetica, Aug. 2005.
-
(2005)
Research Report
, vol.IT-LU-O-162-050823
-
-
Laud, P.1
-
35
-
-
26844509701
-
A type system for computationally secure information flow
-
LNCS 3623
-
P. Laud and V. Vene. A Type System for Computationally Secure Information Flow. In proc. of FCT 2005 (LNCS 3623), pages 365-377.
-
Proc. of FCT 2005
, pp. 365-377
-
-
Laud, P.1
Vene, V.2
-
37
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
LNCS 1708
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. Probabilistic Polynomial-Time Equivalence and Security Analysis. In proc. of FM '99 (LNCS 1708), pages 776-793.
-
Proc. of FM '99
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
38
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using FDR
-
LNCS 1055
-
G. Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In proc. of TACAS '96 (LNCS 1055), pages 147-166.
-
Proc. of TACAS '96
, pp. 147-166
-
-
Lowe, G.1
-
39
-
-
0037250964
-
Formal methods for cryptographic protocol analysis: Emerging issues and trends
-
Jan.
-
C. Meadows. Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends. IEEE Journal on Selected Areas in Communication, 21(1):44-54, Jan. 2003.
-
(2003)
IEEE Journal on Selected Areas in Communication
, vol.21
, Issue.1
, pp. 44-54
-
-
Meadows, C.1
-
40
-
-
24144482305
-
Adaptive security of symbolic encryption
-
(LNCS 3378)
-
D. Micciancio and S. Panjwani. Adaptive Security of Symbolic Encryption. In proc. of TCC 2005 (LNCS 3378), pages 169-187.
-
Proc. of TCC 2005
, pp. 169-187
-
-
Micciancio, D.1
Panjwani, S.2
-
42
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
LNCS 2951
-
D. Micciancio and B. Warinschi. Soundness of Formal Encryption in the Presence of Active Adversaries. In proc. TCC 2004 (LNCS 2951), pages 133-151.
-
Proc. TCC 2004
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
43
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec.
-
R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, Dec. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
44
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
B. Pfitzmann and M. Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In IEEE S&P 2001, pages 184-200.
-
IEEE S&P 2001
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
45
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
LNCS 576
-
C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In proc. of CRYPTO '91 (LNCS 576), pages 433-444.
-
Proc. of CRYPTO '91
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
46
-
-
35048876713
-
Probabilistic bisimulation and equivalence for security analysis of network protocols
-
LNCS 2987
-
A. Ramanathan, J. C. Mitchell, A. Scedrov, and V. Teague. Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. In proc. of FOSSACS 2004 (LNCS 2987), pages 468-483.
-
Proc. of FOSSACS 2004
, pp. 468-483
-
-
Ramanathan, A.1
Mitchell, J.C.2
Scedrov, A.3
Teague, V.4
-
47
-
-
0020301290
-
Theory and applications of trapdoor functions (extended abstract)
-
A. Yao. Theory and applications of trapdoor functions (extended abstract). In proc. of FOCS '82, pages 80-91.
-
Proc. of FOCS '82
, pp. 80-91
-
-
Yao, A.1
-
48
-
-
35048850444
-
A note on the perfect encryption assumption in a process calculus
-
LNCS 2987
-
R. Zunino and P. Degano. A Note on the Perfect Encryption Assumption in a Process Calculus. In proc. of FOSSACS 2004 (LNCS 2987), pages 514-528.
-
Proc. of FOSSACS 2004
, pp. 514-528
-
-
Zunino, R.1
Degano, P.2
|