메뉴 건너뛰기




Volumn 186, Issue SPEC. ISS., 2007, Pages 49-65

Explicit Randomness is not Necessary when Modeling Probabilistic Encryption

Author keywords

authentication; encryption; Probabilistic; protocol verification; secrecy; security models

Indexed keywords

ABSTRACTING; AUTHENTICATION; CODES (SYMBOLS); COMPUTER SCIENCE; DECISION THEORY; MATHEMATICAL MODELS;

EID: 34347206776     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2006.11.044     Document Type: Article
Times cited : (6)

References (13)
  • 1
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • Proc. of Theoretical Aspects of Computer Software. (TACS 2001), Springer-Verlag
    • Abadi M., and Jürjens J. Formal eavesdropping and its computational interpretation. Proc. of Theoretical Aspects of Computer Software. (TACS 2001). LNCS volume 2215 (2001), Springer-Verlag 82-94
    • (2001) LNCS , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 3
    • 0034822279 scopus 로고    scopus 로고
    • Blanchet, B. (2001). An efficient cryptographic protocol verifier based on prolog rules. In Proc. of the 14th Computer Security Foundations Workshop (CSFW'01)
  • 4
    • 24644437051 scopus 로고    scopus 로고
    • Computationally Sound, Automated Proofs for Security Protocols
    • Proc. 14th European Symposium on Programming. (ESOP'05), Springer
    • Cortier V., and Warinschi B. Computationally Sound, Automated Proofs for Security Protocols. Proc. 14th European Symposium on Programming. (ESOP'05). Lecture Notes in Computer Science volume 3444 (2005), Springer 157-171
    • (2005) Lecture Notes in Computer Science , vol.3444 , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 6
    • 34347254388 scopus 로고    scopus 로고
    • Herzog, J.C. (2004). Computational Soundness for Standard Asumptions of Formal Cryptography. Ph thesis, Massachusetts Institute of Technology
  • 7
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proc. of Tools and algoritms for the construction and analysis fof systems. (TACAS'96), Springer-Verlag
    • Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Proc. of Tools and algoritms for the construction and analysis fof systems. (TACAS'96). LNCS volume 1055 (1996), Springer-Verlag 147-166
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 8
    • 0030678388 scopus 로고    scopus 로고
    • Lowe, G. (1997a). Casper: A compiler for the analysis of security protocols. In Proc. of 10th Computer Security Foundations Workshop (CSFW'97). IEEE Computer Society Press
  • 9
    • 84994742813 scopus 로고    scopus 로고
    • Lowe, G. (1997b). A hierarchy of authentication specifications. In Proc. of the 10th Computer Security Foundations Workshop (CSFW'97). IEEE Computer Society Press
  • 10
    • 0344875574 scopus 로고    scopus 로고
    • Analysing protocols subject to guessing attacks
    • Lowe G. Analysing protocols subject to guessing attacks. Journal of Computer Security 12 1 (2004)
    • (2004) Journal of Computer Security , vol.12 , Issue.1
    • Lowe, G.1
  • 11
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • (TCC 2004), Springer-Verlag
    • Micciancio D., and Warinschi B. Soundness of formal encryption in the presence of active adversaries. Theory of Cryptography Conference. (TCC 2004) (2004), Springer-Verlag 133-151
    • (2004) Theory of Cryptography Conference , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 12
    • 0034822801 scopus 로고    scopus 로고
    • Rusinowitch, M. and Turuani, M. (2001). Protocol insecurity with finite number of sessions is NP-complete. In Proc. of the 14th Computer Security Foundations Workshop (CSFW'01), pages 174-190. IEEE Computer Society Press
  • 13
    • 0032678887 scopus 로고    scopus 로고
    • Song, D.X. (1999). Athena: A new efficient automatic checker for security protocol analysis. In Proc. of the 12th Computer Security Foundations Workshop (CSFW'99). IEEE Computer Society Press


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.