-
1
-
-
84978977131
-
-
M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Proc. 4th International Symposium on Theoretical Aspects of Computer Software TACS, pages 82-94, 2001
-
M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS), pages 82-94, 2001.
-
-
-
-
2
-
-
84879078812
-
Reconciling two views of cryptography: The computational soundness of formal encryption
-
Proc. 1st IFIP International Conference on Theoretical Computer Science, of, Springer
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP International Conference on Theoretical Computer Science, volume 1872 of Lecture Notes in Computer Science, pages 3-22. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
33646045378
-
Soundness of formal encryption in the presence of key-cycles
-
Proc. 10th European Symposium on Research in Computer Security ESORICS, of, Springer
-
P. Adão, G. Bana, J. Herzog, and A. Scedrov. Soundness of formal encryption in the presence of key-cycles. In Proc. 10th European Symposium on Research in Computer Security (ESORICS), volume 3679 of Lecture Notes in Computer Science, pages 374-396. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3679
, pp. 374-396
-
-
Adão, P.1
Bana, G.2
Herzog, J.3
Scedrov, A.4
-
6
-
-
35048887380
-
-
M. Backes, B. Pfitzmann, and A. Scedrov. Key-dependent message security under active attacks. IACR Cryptology ePrint Archive 2005/421, Nov. 2005.
-
M. Backes, B. Pfitzmann, and A. Scedrov. Key-dependent message security under active attacks. IACR Cryptology ePrint Archive 2005/421, Nov. 2005.
-
-
-
-
7
-
-
1442292329
-
-
M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.
-
M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.
-
-
-
-
8
-
-
33746365751
-
Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4(2):75-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
9
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In Proc. 38th IEEE Symposium on Foundations of Computer Science (FOCS), pages 394-403, 1997.
-
(1997)
Proc. 38th IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
10
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Advances in Cryptology: CRYPTO '98, of, Springer
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology: CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 26-45. Springer, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
11
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Advances in Cryptology: ASIACRYPT 2000, of, Springer
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology: ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 531-545. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
13
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Advances in Cryptology: EUROCRYPT 2001, of, Springer
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Advances in Cryptology: EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 3(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.3
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
15
-
-
0035163054
-
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pages 136-145, 2001. Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pages 136-145, 2001. Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.
-
-
-
-
16
-
-
33745528593
-
Universally composable symbolic analysis of mutual authentication and key exchange protocols
-
Proc. 3rd Theory of Cryptography Conference TCC, of, Springer
-
R. Canetti and J. Herzog. Universally composable symbolic analysis of mutual authentication and key exchange protocols. In Proc. 3rd Theory of Cryptography Conference (TCC), volume 3876 of Lecture Notes in Computer Science, pages 380-403. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 380-403
-
-
Canetti, R.1
Herzog, J.2
-
18
-
-
0343337504
-
Nonmalleable cryptography
-
D. Dolev, C. Dwork, and M. Naor. Nonmalleable cryptography. SIAM Journal on Computing, 30(2):391-437, 2000.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
20
-
-
4243148483
-
Magic functions
-
C. Dwork, M. Naor, O. Reingold, and L. J. Stockmeyer. Magic functions. Journal of the ACM, 50(6):852-921, 2003.
-
(2003)
Journal of the ACM
, vol.50
, Issue.6
, pp. 852-921
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.J.4
-
21
-
-
0023545076
-
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - or - a completeness theorem for protocols with honest majority. In Proc. 19th Annual ACM Symposium on Theory of Computing (STOC), pages 218-229, 1987.
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - or - a completeness theorem for protocols with honest majority. In Proc. 19th Annual ACM Symposium on Theory of Computing (STOC), pages 218-229, 1987.
-
-
-
-
22
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Advances in Cryptology: CRYPTO '90, of, Springer
-
S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Advances in Cryptology: CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 77-93. Springer, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
24
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
-
(2001)
Proc. 10th European Symposium on Programming (ESOP)
, pp. 77-91
-
-
Laud, P.1
-
25
-
-
3543052976
-
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symposium on Security & Privacy, pages 71-85, 2004.
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symposium on Security & Privacy, pages 71-85, 2004.
-
-
-
-
27
-
-
0024665570
-
Using narrowing in the analysis of key management protocols
-
C. Meadows. Using narrowing in the analysis of key management protocols. In Proc. 10th IEEE Symposium on Security & Privacy, pages 138-147, 1989.
-
(1989)
Proc. 10th IEEE Symposium on Security & Privacy
, pp. 138-147
-
-
Meadows, C.1
-
28
-
-
84974655726
-
Secure computation
-
Advances in Cryptology: CRYPTO '91, of, Springer
-
S. Micali and P. Rogaway. Secure computation. In Advances in Cryptology: CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 392-404. Springer, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
29
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Proc. 1st Theory of Cryptography Conference TCC, of, Springer
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 2951 of Lecture Notes in Computer Science, pages 133-151. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
30
-
-
0034447081
-
-
B. Pfitzmann and M. Waidner. Composition and integrity preservation of secure reactive systems. In Proc. 7th ACM Conference on Computer and Communications Security, pages 245-254, 2000. Extended version (with Matthias Schunter) IBM Research Report RZ 3206, May 2000, http://www.semper.org/ sirene/publ/PfSW1_00ReactSimulIBM.ps.gz.
-
B. Pfitzmann and M. Waidner. Composition and integrity preservation of secure reactive systems. In Proc. 7th ACM Conference on Computer and Communications Security, pages 245-254, 2000. Extended version (with Matthias Schunter) IBM Research Report RZ 3206, May 2000, http://www.semper.org/ sirene/publ/PfSW1_00ReactSimulIBM.ps.gz.
-
-
-
-
31
-
-
0034823388
-
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001. Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082, http://eprint.iacr.org/.
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001. Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082, http://eprint.iacr.org/.
-
-
-
-
32
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Advances in Cryptology: CRYPTO '91, of, Springer
-
C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology: CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 433-444. Springer, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
33
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28(4):656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
|