-
2
-
-
33751043253
-
A computationally sound mechanized prover for security protocols
-
[Bla05]
-
[Bla05] B. Blanchet. A computationally sound mechanized prover for security protocols. Cryptology ePrint Archive, Report 2005/401, 2005. http://eprint.iacr.org/.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.401
-
-
Blanchet, B.1
-
3
-
-
28144444897
-
Secure asynchronous reactive systems
-
[BPW04]
-
[BPW04] M. Backes, B. Pfitzmann, and M. Waidner. Secure asynchronous reactive systems. Cryptology ePrint Archive, Report 2004/082, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.82
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
4
-
-
38149024828
-
The game-playing technique and its application to triple encryption
-
[BR04]
-
[BR04] M. Bellare and P. Rogaway. The game-playing technique and its application to triple encryption. Cryptology ePrint Archive, Report 2004/331, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.331
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
34250771232
-
Task-structured probabilistic I/O automata
-
+06a] Ann Arbor, Michigan, July
-
+06a] R. Canetti, L. Cheung, D. Kaynar, M. Liskov, N. Lynch, O. Pereira, and R. Segala. Task-structured probabilistic I/O automata. In Proceedings of the 8th International Workshop on Discrete Event Systems (WODES), Ann Arbor, Michigan, July 2006.
-
(2006)
Proceedings of the 8th International Workshop on Discrete Event Systems (WODES)
-
-
Canetti, R.1
Cheung, L.2
Kaynar, D.3
Liskov, M.4
Lynch, N.5
Pereira, O.6
Segala, R.7
-
7
-
-
38049165598
-
-
+06b] Technical Report MIT-CSAIL-TR-2006-XXX, CSAIL, MIT, Cambridge, MA
-
+06b] R. Canetti, L. Cheung, D. Kaynar, M. Liskov, N. Lynch, O. Pereira, and R. Segala. Task-structured probabilistic I/O automata. Technical Report MIT-CSAIL-TR-2006-XXX, CSAIL, MIT, Cambridge, MA, 2006.
-
(2006)
Task-structured Probabilistic I/O Automata.
-
-
Canetti, R.1
Cheung, L.2
Kaynar, D.3
Liskov, M.4
Lynch, N.5
Pereira, O.6
Segala, R.7
-
8
-
-
33947639009
-
-
+06c] Technical Report MIT-CSAIL-TR-2006-047, CSAIL, MIT, Cambridge, MA, June
-
+06c] R. Canetti, L. Cheung, D. Kaynar, M. Liskov, N. Lynch, O. Pereira, and R. Segala. Using task-structured probabilistic I/O automata to analyze an oblivious transfer protocol. Technical Report MIT-CSAIL-TR-2006-047, CSAIL, MIT, Cambridge, MA, June 2006.
-
(2006)
Using Task-structured Probabilistic I/O Automata to Analyze An Oblivious Transfer Protocol.
-
-
Canetti, R.1
Cheung, L.2
Kaynar, D.3
Liskov, M.4
Lynch, N.5
Pereira, O.6
Segala, R.7
-
10
-
-
0022080529
-
A randomized protocol for signing contracts
-
[EGL85]
-
[EGL85] S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. CACM, 28(6):637-647, 1985.
-
(1985)
CACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
11
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
[GMR89]
-
[GMR89] S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1):186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
13
-
-
0003979335
-
-
[Gol01] volume I Basic Tools. Cambridge Universirty Press
-
[Gol01] O. Goldreich. Foundations of Cryptography, volume I Basic Tools. Cambridge Universirty Press, 2001.
-
(2001)
Foundations of Cryptography
-
-
Goldreich, O.1
-
14
-
-
33746336609
-
A plausible approach to computer-aided cryptographic proofs
-
[Hal05]
-
[Hal05] S. Halevi. A plausible approach to computer-aided cryptographic proofs. Cryptology ePrint Archive, Report 2005/181, 2005. http://eprint.iacr. org/.
-
(2005)
Cryptology EPrint Archive, Report
, vol.2005
, Issue.181
-
-
Halevi, S.1
-
15
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
[LMMS98]
-
[LMMS98] P.D. Lincoln, J.C. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS-5), pages 112-121, 1998.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS-5)
, pp. 112-121
-
-
Lincoln, P.D.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
16
-
-
35248861970
-
Composition of cryptographic protocols in a probabilistic polynomial-time calculus
-
[MMS03] Proceedings of the 14th International Conference on Concurrency Theory (CONCUR)
-
[MMS03] P. Mateus, J.C. Mitchell, and A. Scedrov. Composition of cryptographic protocols in a probabilistic polynomial-time calculus. In Proceedings of the 14th International Conference on Concurrency Theory (CONCUR), volume 2761 of LNCS, pages 327-349, 2003.
-
(2003)
LNCS
, vol.2761
, pp. 327-349
-
-
Mateus, P.1
Mitchell, J.C.2
Scedrov, A.3
-
18
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
[PW01]
-
[PW01] B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In IEEE Symposium on Security and Privacy, pages 184-200, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
19
-
-
35048876713
-
Probabilistic bisimulation and equivalence for security analysis of network protocols
-
[RMST04] Proceedings of Foundations of Sotware Science and Computation Structires (FOSSACS)
-
[RMST04] A. Ramanathan, J.C. Mitchell, A. Scedrov, and V. Teague. Probabilistic bisimulation and equivalence for security analysis of network protocols. In Proceedings of Foundations of Sotware Science and Computation Structires (FOSSACS), volume 2987 of LNCS, pages 468-483, 2004.
-
(2004)
LNCS
, vol.2987
, pp. 468-483
-
-
Ramanathan, A.1
Mitchell, J.C.2
Scedrov, A.3
Teague, V.4
-
20
-
-
0004181981
-
-
[Seg95] PhD thesis, Department of Electrical Engineering and Computer Science, MIT, May Also, MIT/LCS/TR-676
-
[Seg95] Roberto Segala. Modeling and Verification of Randomized Distributed Real-Time Systems. PhD thesis, Department of Electrical Engineering and Computer Science, MIT, May 1995. Also, MIT/LCS/TR-676.
-
(1995)
Modeling and Verification of Randomized Distributed Real-Time Systems
-
-
Segala, R.1
-
21
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
[Sho04]
-
[Sho04] V. Shoup. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.332
-
-
Shoup, V.1
-
22
-
-
0001609136
-
Probabilistic simulations for probabilistic processes
-
[SL95] August
-
[SL95] Roberto Segala and Nancy Lynch. Probabilistic simulations for probabilistic processes. Nordic Journal of Computing, 2(2):250-273, August 1995.
-
(1995)
Nordic Journal of Computing
, vol.2
, Issue.2
, pp. 250-273
-
-
Segala, R.1
Lynch, N.2
|