-
1
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Proc. 4th TACS, pages 82-94, 2001.
-
(2001)
Proc. 4th TACS
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
2
-
-
84879078812
-
Reconciling two views of cryptography: The computational soundness of formal encryption
-
Proc. 1st IFIP TCS. Springer
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP TCS, volume 1872 of LNCS, pages 3-22. Springer, 2000.
-
(2000)
LNCS
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
35048863550
-
A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
-
Proc. 9th ESORICS. Springer
-
M. Backes. A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol. In Proc. 9th ESORICS, volume 3193 of LNCS, pages 89-108. Springer, 2004.
-
(2004)
LNCS
, vol.3193
, pp. 89-108
-
-
Backes, M.1
-
4
-
-
28144458018
-
A cryptographically sound Dolev-Yao style security proof of an electronic payment system
-
M. Backes and M. Dürmuth. A cryptographically sound Dolev-Yao style security proof of an electronic payment system. In Proc. I8th IEEE CSFW, pages 78-93, 2005.
-
(2005)
Proc. I8th IEEE CSFW
, pp. 78-93
-
-
Backes, M.1
Dürmuth, M.2
-
5
-
-
10844233317
-
A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol
-
M. Backes and B. Pfitzmann. A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. Journal on Selected Areas in Communications, 22(10):2075-2086, 2004.
-
(2004)
Journal on Selected Areas in Communications
, vol.22
, Issue.10
, pp. 2075-2086
-
-
Backes, M.1
Pfitzmann, B.2
-
6
-
-
4944234643
-
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
-
M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In Proc. I7th IEEE CSFW, pages 204-218, 2004.
-
(2004)
Proc. I7th IEEE CSFW
, pp. 204-218
-
-
Backes, M.1
Pfitzmann, B.2
-
7
-
-
33646036428
-
Limits of the cryptographic realization of Dolev-Yao-style XOR
-
Proc. 10th ESORICS. Springer
-
M. Backes and B. Pfitzmann. Limits of the cryptographic realization of Dolev-Yao-style XOR. In Proc. 10th ESORICS, volume 3679 of LNCS, pages 178-196. Springer, 2005.
-
(2005)
LNCS
, vol.3679
, pp. 178-196
-
-
Backes, M.1
Pfitzmann, B.2
-
8
-
-
1442292329
-
A composable cryptographic library with nested operations
-
M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations. In Proc. 10th ACM CCS, pages 220-230, 2003.
-
(2003)
Proc. 10th ACM CCS
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
9
-
-
0142250274
-
Symmetric authentication within a simulatable cryptographic library
-
Proc. 8th ESORICS. Springer
-
M. Backes, B. Pfitzmann, and M. Waidner. Symmetric authentication within a simulatable cryptographic library. In Proc. 8th ESORICS, volume 2808 of LNCS, pages 271-290. Springer, 2003.
-
(2003)
LNCS
, vol.2808
, pp. 271-290
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
12
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. 1st ACM CCS, pages 62-73, 1993.
-
(1993)
Proc. 1st ACM CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
13
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE CSFW, pages 82-96, 2001.
-
(2001)
Proc. 14th IEEE CSFW
, pp. 82-96
-
-
Blanchet, B.1
-
14
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
B. Blanchet. A computationally sound mechanized prover for security protocols. In Proc. 27th IEEE Symp. on Security & Privacy, pages 140-154, 2006.
-
(2006)
Proc. 27th IEEE Symp. on Security & Privacy
, pp. 140-154
-
-
Blanchet, B.1
-
15
-
-
0842305659
-
Towards realizing random oracles: Hash functions that hide all partial information
-
Springer
-
R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In Proc. CRYPTO 97, pages 455-469. Springer, 1997.
-
(1997)
Proc. CRYPTO 97
, pp. 455-469
-
-
Canetti, R.1
-
16
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE FOCS, pages 136-145, 2001.
-
(2001)
Proc. 42nd IEEE FOCS
, pp. 136-145
-
-
Canetti, R.1
-
17
-
-
84880897758
-
Universally composable commitments
-
Proc. CRYPTO 2001. Springer
-
R. Canetti and M. Fischlin. Universally composable commitments. In Proc. CRYPTO 2001, volume 2139 of LNCS, pages 19-40. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
18
-
-
33745528593
-
Universally composable symbolic analysis of mutual authentication and key exchange protocols
-
Springer
-
R. Canetti and J. Herzog. Universally composable symbolic analysis of mutual authentication and key exchange protocols. In Proc. 3rd Theory of Cryptography Conf. (TCC), pages 380-403. Springer, 2006.
-
(2006)
Proc. 3rd Theory of Cryptography Conf. (TCC)
, pp. 380-403
-
-
Canetti, R.1
Herzog, J.2
-
19
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
Proc. EUROCRYPT 2002. Springer
-
R. Canetti and H. Krawczyk. Universally composable notions of key exchange and secure channels. In Proc. EUROCRYPT 2002, volume 2332 of LNCS, pages 337-351. Springer, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
21
-
-
70350577735
-
Games and the impossibility of realizable ideal functionality
-
Springer. To appear
-
A. Datta, A. Derek, J. Mitchell, A. Ramanathan, and A. Scedrov. Games and the impossibility of realizable ideal functionality. In Proc. 3rd Theory of Cryptography Conf. (TCC). Springer, 2006. To appear.
-
(2006)
Proc. 3rd Theory of Cryptography Conf. (TCC)
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Ramanathan, A.4
Scedrov, A.5
-
22
-
-
26444565771
-
Probabilistic polynomial-time semantics for a protocol security logic
-
Proc. 32nd Intern. Colloquium on Automata, Languages and Programming (ICALP). Springer
-
A. Datta, A. Derek, J. Mitchell, V. Shmatikov, and M. Turuani. Probabilistic polynomial-time semantics for a protocol security logic. In Proc. 32nd Intern. Colloquium on Automata, Languages and Programming (ICALP), volume 3580 of LNCS, pages 16-29. Springer, 2005.
-
(2005)
LNCS
, vol.3580
, pp. 16-29
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Shmatikov, V.4
Turuani, M.5
-
25
-
-
35048859832
-
Universally composable commitments using random oracles
-
Proc. 1st Theory of Cryptography Conf. (TCC) Springer
-
D. Hofheinz and J. Müller-Quade. Universally composable commitments using random oracles. In Proc. 1st Theory of Cryptography Conf. (TCC), volume 2951 of LNCS, pages 58-76. Springer, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 58-76
-
-
Hofheinz, D.1
Müller-Quade, J.2
-
26
-
-
0345412676
-
Logics for reasoning about cryptographic constructions
-
R. Impagliazzo and B. M. Kapron. Logics for reasoning about cryptographic constructions. In Proc. 44th IEEE FOCS, pages 372-381, 2003.
-
(2003)
Proc. 44th IEEE FOCS
, pp. 372-381
-
-
Impagliazzo, R.1
Kapron, B.M.2
-
27
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symp. on Programming (ESOP), pages 77-91, 2001.
-
(2001)
Proc. 10th European Symp. on Programming (ESOP)
, pp. 77-91
-
-
Laud, P.1
-
28
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symp. on Security & Privacy, pages 71-85, 2004.
-
(2004)
Proc. 25th IEEE Symp. on Security & Privacy
, pp. 71-85
-
-
Laud, P.1
-
29
-
-
33745787443
-
Secrecy types for a simulatable cryptographic library
-
P. Laud. Secrecy types for a simulatable cryptographic library. In Proc. I2th ACM CCS, pages 26-35, 2005.
-
(2005)
Proc. I2th ACM CCS
, pp. 26-35
-
-
Laud, P.1
-
30
-
-
0004256761
-
-
PhD thesis, Georgia Institute of Technology
-
M. Merritt. Cryptographic Protocols. PhD thesis, Georgia Institute of Technology, 1983.
-
(1983)
Cryptographic Protocols
-
-
Merritt, M.1
-
31
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Proc. 1st Theory of Cryptography Conf. (TCC). Springer
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conf. (TCC), volume 2951 of LNCS, pages 133-151. Springer, 2004.
-
(2004)
LNCS
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
32
-
-
0032307051
-
A linguistic characterization of bounded oracle computation and probabilistic polynomial time
-
J. Mitchell, M. Mitchell, and A. Scedrov. A linguistic characterization of bounded oracle computation and probabilistic polynomial time. In Proc. 39th FOCS, pages 725-733, 1998.
-
(1998)
Proc. 39th FOCS
, pp. 725-733
-
-
Mitchell, J.1
Mitchell, M.2
Scedrov, A.3
-
33
-
-
0345280512
-
A probabilistic polynominal-time process calculus for analysis of cryptographic protocols
-
J. Mitchell, M. Mitchell, A. Scedrov, and V. Teague. A probabilistic polynominal-time process calculus for analysis of cryptographic protocols. ENTCS, 47:1-31, 2001.
-
(2001)
ENTCS
, vol.47
, pp. 1-31
-
-
Mitchell, J.1
Mitchell, M.2
Scedrov, A.3
Teague, V.4
-
34
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85-128, 1998.
-
(1998)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.1
-
35
-
-
0034447081
-
Composition and integrity preservation of secure reactive systems
-
B. Pfitzmann and M. Waidner. Composition and integrity preservation of secure reactive systems. In Proc. 7th ACM CCS, pages 245-254, 2000.
-
(2000)
Proc. 7th ACM CCS
, pp. 245-254
-
-
Pfitzmann, B.1
Waidner, M.2
-
36
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symp. on S & P, pages 184-200, 2001.
-
(2001)
Proc. 22nd IEEE Symp. on S & P
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
37
-
-
33947656534
-
Cryptographically sound theorem proving
-
To appear
-
C. Sprenger, M. Backes, D. Basin, B. Pfitzmann, and M. Waidner. Cryptographically sound theorem proving. In Proc. I9th IEEE CSFW, 2006. To appear.
-
(2006)
Proc. I9th IEEE CSFW
-
-
Sprenger, C.1
Backes, M.2
Basin, D.3
Pfitzmann, B.4
Waidner, M.5
-
38
-
-
0020301290
-
Theory and applications of trapdoor functions
-
A. C. Yao. Theory and applications of trapdoor functions. In Proc. 23rd FOCS, pages 80-91, 1982.
-
(1982)
Proc. 23rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
|