-
1
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ABADI, M., AND FOURNET, C. Mobile values, new names, and secure communication. In 28th ACM Symposium on Principles of Programming Languages (2001), pp. 104-115.
-
(2001)
28th ACM Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Expanded version available as SRC Research Report 149 (January 1998)
-
ABADI, M., AND GORDON, A. D. A calculus for cryptographic protocols: the spi calculus. Information and Computation 143 (1999), 1-70. Expanded version available as SRC Research Report 149 (January 1998).
-
(1999)
Information and Computation
, vol.143
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
84954435058
-
-
ATALLAH, M. J., Ed. CRC Press LLC, ch. 24
-
ATALLAH, M. J., Ed. Algorithms and Theory of Computation Handbook. CRC Press LLC, 1999, ch. 24, pp. 19-28.
-
(1999)
Algorithms and Theory of Computation Handbook
, pp. 19-28
-
-
-
6
-
-
0000523051
-
A logic of authentication
-
BURROWS, M., ABADI, M., AND NEEDHAM, R. A logic of authentication. Proceedings of the Royal Society, Series A 426, 1871 (1989), 233-271.
-
(1989)
Proceedings of the Royal Society, Series A 426
, vol.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
0003185332
-
SRC Research Report 39
-
and, in a shortened form, February
-
Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
-
8
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE. Full version available at
-
CANETTI, R. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symp. on the Foundations of Computer Science (2001), IEEE. Full version available at http://eprint.iacr.org/2000/ 067/.
-
(2001)
Proc. 42nd IEEE Symp. on the Foundations of Computer Science
-
-
Canetti, R.1
-
11
-
-
0034834930
-
A compositional logic for protocol correctness
-
Cape Breton, Nova Scotia, Canada, June
-
DURGIN, N. A., MITCHELL, J. C., AND PAVLOVIC, D. A compositional logic for protocol correctness. In 14th IEEE Computer Security Foundations Workshop (Cape Breton, Nova Scotia, Canada, June 2001).
-
(2001)
14th IEEE Computer Security Foundations Workshop
-
-
Durgin, N.A.1
Mitchell, J.C.2
Pavlovic, D.3
-
12
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
EL GAMAL, T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 (1985), 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
El Gamal, T.1
-
14
-
-
84862469269
-
-
June Manuscript under preparation; latest version available
-
GOLDREICH, O. The Foundations of Cryptography, vol. 2. June 2003. Manuscript under preparation; latest version available at http://www.wisdom. weizmann.ac.il/̃oded/foc-vol2.html.
-
(2003)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
15
-
-
0004147444
-
-
Lecture notes for a class taught by the authors at MIT (1996-2001)
-
GOLDWASSER, S., AND BELLARE, M. Lecture Notes on Cryptography. 2003. Lecture notes for a class taught by the authors at MIT (1996-2001); available online at http://www.cs.nyu.edu/courses/fall01/G22.3033-003/.
-
(2003)
Lecture Notes on Cryptography
-
-
Goldwasser, S.1
Bellare, M.2
-
16
-
-
0021409284
-
Probabilistic encryption
-
Previous version in STOC 1982
-
GOLDWASSER, S., AND MICALI, S. Probabilistic encryption. Journal of Computer and System Sciences 28, 1 (1984), 270-299. Previous version in STOC 1982.
-
(1984)
Journal of Computer and System Sciences
, vol.28
, Issue.1
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
18
-
-
0030721924
-
Quantitative analysis and model checking
-
HUTH, M., AND KWIATKOWSKA, M. Z. Quantitative analysis and model checking. In LICS '97 (1997), pp. 111-122.
-
(1997)
LICS '97
, pp. 111-122
-
-
Huth, M.1
Kwiatkowska, M.Z.2
-
19
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
San Francisco, California, M. K. Reiter, Ed., ACM Press
-
LINCOLN, P. D., MITCHELL, J. C., MITCHELL, M., AND SCEDROV, A. A probabilistic poly-time framework for protocol analysis. In Proc. 5th ACM Conference on Computer and Communications Security (San Francisco, California, 1998), M. K. Reiter, Ed., ACM Press, pp. 112-121.
-
(1998)
Proc. 5th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.D.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
20
-
-
35248861970
-
Composition of cryptographic protocols in a probabilistic polynomial-time process calculus
-
14th International Conference on Concurrency Theory (Marseille, France, 2003), R. M. Amadio and D. Lugiez, Eds., Springer-Verlag
-
MATEUS, P., MITCHELL, J. C., AND SCEDROV, A. Composition of cryptographic protocols in a probabilistic polynomial-time process calculus. In 14th International Conference on Concurrency Theory (Marseille, France, 2003), R. M. Amadio and D. Lugiez, Eds., vol. 2761 of Lecture Notes in Computer Science, Springer-Verlag, pp. 327-349.
-
Lecture Notes in Computer Science
, vol.2761
, pp. 327-349
-
-
Mateus, P.1
Mitchell, J.C.2
Scedrov, A.3
-
21
-
-
0003954103
-
-
International Series in Computer Science. Prentice Hall
-
MILNER, R. Communication and Concurrency. International Series in Computer Science. Prentice Hall, 1989.
-
(1989)
Communication and Concurrency
-
-
Milner, R.1
-
22
-
-
0032307051
-
A linguistic characterization of bounded oracle computation and probabilistic polynomial time
-
Palo Alto, California, IEEE
-
MITCHELL, J. C., MITCHELL, M., AND SCEDROV, A. A linguistic characterization of bounded oracle computation and probabilistic polynomial time. In Proc. 39th Annual IEEE Symposium on the Foundations of Computer Science (Palo Alto, California, 1998), IEEE, pp. 725-733.
-
(1998)
Proc. 39th Annual IEEE Symposium on the Foundations of Computer Science
, pp. 725-733
-
-
Mitchell, J.C.1
Mitchell, M.2
Scedrov, A.3
-
23
-
-
1442267753
-
A probabilistic polynomial-time calculus for the analysis of cryptographic protocols (preliminary report)
-
S. Brookes and M. Mislove, Eds., Electronic notes in Theoretical Computer Science
-
MITCHELL, J. C., RAMANATHAN, A., SCEDROV, A., AND TEAGUE, V. A probabilistic polynomial-time calculus for the analysis of cryptographic protocols (preliminary report). In 17th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, May, 2001 (2001), S. Brookes and M. Mislove, Eds., vol. 45, Electronic notes in Theoretical Computer Science.
-
(2001)
17th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, May, 2001
, vol.45
-
-
Mitchell, J.C.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
24
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
NEEDHAM, R., AND SCHROEDER, M. Using encryption for authentication in large networks of computers. Communications of the ACM 21, 12 (1978), 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
26
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
Washington
-
PFITZMANN, B., AND WAIDNER, M. A model for asynchronous reactive systems and its application to secure message transmission. In IEEE Symposium on Security and Privacy (Washington, 2001), pp. 184-200.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
27
-
-
84862472566
-
-
RAMANATHAN, A., MITCHELL, J. C., SCEDROV, A., AND TEAGUE, V. A probabilistic polynomial-time calculus for the analysis of cryptographic protocols. ftp://ftp.cis.upenn.edu/pub/papers/scedrov/ppc-2004-long.{ps,pdf}, 2004.
-
(2004)
A Probabilistic Polynomial-time Calculus for the Analysis of Cryptographic Protocols
-
-
Ramanathan, A.1
Mitchell, J.C.2
Scedrov, A.3
Teague, V.4
-
29
-
-
0006419926
-
Reactive, generative, and stratified models of probabilistic processes
-
August
-
VAN GLABBEEK, R. J., SMOLKA, S. A., AND STEFFEN, B. Reactive, generative, and stratified models of probabilistic processes. International Journal on Information and Computation 121, 1 (August 1995).
-
(1995)
International Journal on Information and Computation
, vol.121
, Issue.1
-
-
Van Glabbeek, R.J.1
Smolka, S.A.2
Steffen, B.3
-
30
-
-
0020301290
-
Theory and applications of trapdoor functions
-
YAO, A. C.-C. Theory and applications of trapdoor functions. In IEEE Foundations of Computer Science (1982), pp. 80-91.
-
(1982)
IEEE Foundations of Computer Science
, pp. 80-91
-
-
Yao, A.C.-C.1
|