-
1
-
-
84879078812
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
IFIP TCS, of, Springer Berlin Heidelberg
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In IFIP TCS, volume 2000 of Lecture Notes in Computer Science, pages 3-22. Springer Berlin Heidelberg, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2000
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
32844458560
-
A universally composable cryptographic library. Cryptology ePrint Archive
-
Report 2003/015
-
M. Backes, B. Pfitzmann, and M. Waidner. A universally composable cryptographic library. Cryptology ePrint Archive, Report 2003/015, 2003.
-
(2003)
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
4
-
-
33749579009
-
A computationally sound mechanized prover for security protocols. Cryptology ePrint Archive
-
Report 2005/401
-
B. Blanchet. A computationally sound mechanized prover for security protocols. Cryptology ePrint Archive, Report 2005/401, 2005.
-
(2005)
-
-
Blanchet, B.1
-
5
-
-
33749550797
-
Automated security proofs with sequences of games. Cryptology ePrint Archive
-
Report 2006/069
-
B. Blanchet and D. Pointcheval. Automated security proofs with sequences of games. Cryptology ePrint Archive, Report 2006/069, 2006.
-
(2006)
-
-
Blanchet, B.1
Pointcheval, D.2
-
7
-
-
33947639009
-
Using Probabilistic I/O Automata to analyze an oblivious transfer protocol
-
Technical Report 2005/452, Cryptology ePrint Archive, 2005
-
R. Canetti, L. Cheung, D. Kaynar, M. Liskov, N. Lynch, O. Pereira, and R. Segala. Using Probabilistic I/O Automata to analyze an oblivious transfer protocol. Technical Report 2005/452, Cryptology ePrint Archive, 2005.
-
-
-
Canetti, R.1
Cheung, L.2
Kaynar, D.3
Liskov, M.4
Lynch, N.5
Pereira, O.6
Segala, R.7
-
8
-
-
33845213035
-
Time-bounded task-PIOAs: A framework for analyzing security protocols
-
20th International Symposium on Distributed Computing DISC 2006, of, Springer Berlin Heidelberg
-
R. Canetti, L. Cheung, D. Kaynar, M. Liskov, N. Lynch, O. Pereira, and R. Segala. Time-bounded task-PIOAs: A framework for analyzing security protocols. In 20th International Symposium on Distributed Computing (DISC 2006), volume 4167 of Lecture Notes in Computer Science, pages 238-253. Springer Berlin Heidelberg, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4167
, pp. 238-253
-
-
Canetti, R.1
Cheung, L.2
Kaynar, D.3
Liskov, M.4
Lynch, N.5
Pereira, O.6
Segala, R.7
-
10
-
-
33750295660
-
Foundations of Cryptography
-
Cambridge University Press
-
O. Goldreich. Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press, 2001.
-
(2001)
Basic Tools
, vol.1
-
-
Goldreich, O.1
-
11
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press
-
O. Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, 2004.
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
12
-
-
24644476184
-
Completing the picture: Soundness of formal encryption in the presence of active adversaries
-
Technical Report TR-2004-19, Verimag
-
R. Janvier, Y. Lakhnech, and L. Mazare. Completing the picture: Soundness of formal encryption in the presence of active adversaries. Technical Report TR-2004-19, Verimag, 2005.
-
(2005)
-
-
Janvier, R.1
Lakhnech, Y.2
Mazare, L.3
-
13
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
FM '99: Proceedings of the World Congress on Formal Methods in the Development of Computing Systems-1708 of, Springer Berlin Heidelberg
-
P. Lincoln, J. C. Mitchell, M. Mitchell, and A. Scedrov. Probabilistic polynomial-time equivalence and security analysis. In FM '99: Proceedings of the World Congress on Formal Methods in the Development of Computing Systems-Volume I, volume 1708 of Lecture Notes in Computer Science, pages 776-793. Springer Berlin Heidelberg, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
16
-
-
0344875571
-
Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
-
D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 99-129
-
-
Micciancio, D.1
Warinschi, B.2
-
17
-
-
0003954103
-
-
Prentice-Hall International, Englewood Cleiffs
-
R. Milner. Communication and Concurrency. Prentice-Hall International, Englewood Cleiffs, 1989.
-
(1989)
Communication and Concurrency
-
-
Milner, R.1
-
18
-
-
33244491452
-
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
-
J. C. Mitchell, A. Ramanathan, A. Scedrov, and V. Teague. A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theoretical Computer Science, 353(1):118-164, 2006.
-
(2006)
Theoretical Computer Science
, vol.353
, Issue.1
, pp. 118-164
-
-
Mitchell, J.C.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
21
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
IEEE Computer Society
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In SP '01: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 184-200. IEEE Computer Society, 2001.
-
(2001)
SP '01: Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
22
-
-
35048834604
-
-
R. Segala. Modeling and Verification of Randomized Distributed Real-Time Systems. PhD thesis, Department of Electrical Engineering and Computer Science, MIT, 1995. Also appears as technical report MIT/LCS/TR-676.
-
R. Segala. Modeling and Verification of Randomized Distributed Real-Time Systems. PhD thesis, Department of Electrical Engineering and Computer Science, MIT, 1995. Also appears as technical report MIT/LCS/TR-676.
-
-
-
-
23
-
-
33749562781
-
Probability and nondeterminism in operational models of concurrency
-
CONCUR 2006, Concurrency Theory, of, Springer Berlin Heidelberg
-
R. Segala. Probability and nondeterminism in operational models of concurrency. In CONCUR 2006 - Concurrency Theory, volume 4137 of Lecture Notes in Computer Science, pages 64-78. Springer Berlin Heidelberg, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4137
, pp. 64-78
-
-
Segala, R.1
-
24
-
-
0001609136
-
Probabilistic simulations for probabilistic processes
-
R. Segala and N. Lynch. Probabilistic simulations for probabilistic processes. Nordic Journal of Computing, 2(2):250-273, 1995.
-
(1995)
Nordic Journal of Computing
, vol.2
, Issue.2
, pp. 250-273
-
-
Segala, R.1
Lynch, N.2
-
25
-
-
33745142417
-
A tool for taming complexity in security proofs. Cryptology ePrint Archive
-
Report 2004/332
-
V. Shoup. A tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332, 2004.
-
(2004)
-
-
Shoup, V.1
-
26
-
-
21144435765
-
Probabilistic automata: System types, parallel composition and comparison
-
Validation of Stochastic Systems: A Guide to Current Research, of, Springer Verlag Heidelberg
-
A. Sokolova and E. P. de Vink. Probabilistic automata: System types, parallel composition and comparison. In Validation of Stochastic Systems: A Guide to Current Research, volume 2925 of Lecture Notes in Computer Science, pages 1-43. Springer Verlag Heidelberg, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2925
, pp. 1-43
-
-
Sokolova, A.1
de Vink, E.P.2
|