-
2
-
-
35048822401
-
Deciding knowledge in security protocols under equational theories
-
Proc. 31st International Colloquium on Automata, Languages and Programming (ICALP'04), Springer
-
M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. In Proc. 31st International Colloquium on Automata, Languages and Programming (ICALP'04), volume 3142 of LNCS, pages 46-58. Springer, 2004.
-
(2004)
LNCS
, vol.3142
, pp. 46-58
-
-
Abadi, M.1
Cortier, V.2
-
5
-
-
0000298407
-
A bisimulation method for cryptographic protocols
-
M. Abadi and A. D. Gordon. A bisimulation method for cryptographic protocols. Nordic Journal of Computing, 5(4):267-303, 1998.
-
(1998)
Nordic Journal of Computing
, vol.5
, Issue.4
, pp. 267-303
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
7
-
-
26444502046
-
Password-based encryption analyzed
-
Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), Springer
-
M. Abadi and B. Warinschi. Password-based encryption analyzed. In Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), volume 3580 of LNCS, pages 664-676. Springer, 2005.
-
(2005)
LNCS
, vol.3580
, pp. 664-676
-
-
Abadi, M.1
Warinschi, B.2
-
10
-
-
33745778843
-
Deciding security of protocols against off-line guessing attacks
-
Alexandria, Virginia, USA, Nov.
-
M. Baudet. Deciding security of protocols against off-line guessing attacks. In Proc. 12th ACM Conference on Computer and Communications Security (CCS'05), pages 16-25, Alexandria, Virginia, USA, Nov. 2005.
-
(2005)
Proc. 12th ACM Conference on Computer and Communications Security (CCS'05)
, pp. 16-25
-
-
Baudet, M.1
-
11
-
-
26444541858
-
Computationally sound implementations of equational theories against passive adversaries
-
Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), Springer
-
M. Baudet, V. Cortier, and S. Kremer. Computationally sound implementations of equational theories against passive adversaries. In Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), volume 3580 of LNCS, pages 652-663. Springer, 2005.
-
(2005)
LNCS
, vol.3580
, pp. 652-663
-
-
Baudet, M.1
Cortier, V.2
Kremer, S.3
-
12
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology - EUROCRYPT'00, Springer
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology - EUROCRYPT'00, volume 1807 of LNCS, pages 139-155. Springer, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
16
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
Advances in Cryptology - EUROCRYPT'00, Springer
-
V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Advances in Cryptology - EUROCRYPT'00, volume 1807 of LNCS, pages 156-171. Springer, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
17
-
-
26444559794
-
Analysing password protocol security against off-line dictionary attacks
-
Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands
-
R. Corin, J. M. Doumen, and S. Etalle. Analysing password protocol security against off-line dictionary attacks. Technical report TR-CTIT-03-52, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands, 2003.
-
(2003)
Technical Report
, vol.TR-CTIT-03-52
-
-
Corin, R.1
Doumen, J.M.2
Etalle, S.3
-
18
-
-
13544254153
-
Guess what? Here is a new tool that finds some new guessing attacks
-
R. Corin, S. Malladi, J. Alves-Foss, and S. Etalle. Guess what? Here is a new tool that finds some new guessing attacks (extended abstract). In IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security (WITS'03), pages 62-71, 2003.
-
(2003)
IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security (WITS'03)
, pp. 62-71
-
-
Corin, R.1
Malladi, S.2
Alves-Foss, J.3
Etalle, S.4
-
20
-
-
33745805266
-
-
Private communication
-
C. Fournet. Private communication, 2002.
-
(2002)
-
-
Fournet, C.1
-
21
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
Springer
-
R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In Advances in Cryptology - EUROCRYPT'03, volume 2656 of LNCS, pages 524-543. Springer, 2003.
-
(2003)
Advances in Cryptology - EUROCRYPT'03
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
22
-
-
84880888233
-
Session key generation using human passwords only
-
Advances in Cryptology - CRYPTO'01, Springer
-
O. Goldreich and Y. Lindell. Session key generation using human passwords only. In Advances in Cryptology - CRYPTO'01, volume 2139 of LNCS, pages 403-432. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 403-432
-
-
Goldreich, O.1
Lindell, Y.2
-
24
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, T. M. A. Lomas, R. M. Needham, and J. H. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5):648-656, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
25
-
-
84945132563
-
Practical password-authenticated key exchange provably secure under standard assumptions
-
Advances in Cryptology EUROCRYPT'01, Springer
-
J. Katz, R. Ostrovsky, and M. Yung. Practical password-authenticated key exchange provably secure under standard assumptions. In Advances in Cryptology EUROCRYPT'01, volume 2045 of LNCS, pages 475-494. Springer, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
26
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 2004 IEEE Symposium on Security and Privacy (SSP'04), pages 71-85, 2004.
-
(2004)
Proc. 2004 IEEE Symposium on Security and Privacy (SSP'04)
, pp. 71-85
-
-
Laud, P.1
-
27
-
-
0344875574
-
Analysing protocols subject to guessing attacks
-
G. Lowe. Analysing protocols subject to guessing attacks. Journal of Computer Security, 12(1):83-98, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 83-98
-
-
Lowe, G.1
-
28
-
-
0344875571
-
Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
-
D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 99-129
-
-
Micciancio, D.1
Warinschi, B.2
-
29
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Proc. Theory of Cryptography Conference (TCC'04), Springer
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. Theory of Cryptography Conference (TCC'04), volume 2951 of LNCS, pages 133-151. Springer, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
30
-
-
26444517444
-
About the security of ciphers (semantic security and pseudo-random permutations)
-
Proc. Selected Areas in Cryptography (SAC'04), Springer
-
D. H. Phan and D. Pointcheval. About the security of ciphers (semantic security and pseudo-random permutations). In Proc. Selected Areas in Cryptography (SAC'04), volume 3357 of LNCS, pages 185-200. Springer, 2004.
-
(2004)
LNCS
, vol.3357
, pp. 185-200
-
-
Phan, D.H.1
Pointcheval, D.2
-
31
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner. Refinement and extension of encrypted key exchange. ACM SIGOPS Oper. Syst. Rev., 29(3):22-30, 1995.
-
(1995)
ACM SIGOPS Oper. Syst. Rev.
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|