메뉴 건너뛰기




Volumn 2951, Issue , 2004, Pages 133-151

Soundness of formal encryption in the presence of active adversaries

Author keywords

[No Author keywords available]

Indexed keywords

CARRY LOGIC; COMPUTATION THEORY; POLYNOMIAL APPROXIMATION; PROBABILITY DISTRIBUTIONS;

EID: 35048899313     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24638-1_8     Document Type: Article
Times cited : (146)

References (21)
  • 1
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • Sendai, Japan, Oct. Springer-Verlag
    • M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In TACS 2001, volume 2215 of LNCS, pages 82-94, Sendai, Japan, Oct. 2001. Springer-Verlag.
    • (2001) TACS 2001, Volume 2215 of LNCS , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 5
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting
    • number 1807 in LNCS
    • M. Bellare, A. Boldyreva, and S. Micali. Public-key encryption in a multi-user setting. In Proceedings of EUROCRYPT'00, number 1807 in LNCS, pages 259-274, 2000.
    • (2000) Proceedings of Eurocrypt , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 6
    • 0010254150 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. of EUROCRYPT'00, LNCS, 2000.
    • (2000) Proc. of Eurocrypt
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 9
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of FOCS'01, pages 136-145, 2001.
    • (2001) Proceedings of FOCS'01 , pp. 136-145
    • Canetti, R.1
  • 12
    • 24144446250 scopus 로고    scopus 로고
    • Weak Key Authenticity and the Computational Completeness of Formal Encryption
    • D. Boneh, editor, Springer-Verlag, Aug.
    • V. Gligor and D. O. Horvitz. Weak Key Authenticity and the Computational Completeness of Formal Encryption. In D. Boneh, editor, CRYPTO 2003, volume 2729 of LNCS, pages 530-547. Springer-Verlag, Aug. 2003.
    • (2003) CRYPTO 2003, Volume 2729 of LNCS , vol.2729 , pp. 530-547
    • Gligor, V.1    Horvitz, D.O.2
  • 15
    • 0345412676 scopus 로고    scopus 로고
    • Logics for reasoning about cryptographic constructions
    • R. Impagliazzo and B. Kapron. Logics for reasoning about cryptographic constructions. In STOC'03, pages 372-383, 2003.
    • (2003) STOC'03 , pp. 372-383
    • Impagliazzo, R.1    Kapron, B.2
  • 17
    • 0003130993 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schröeder algorithm
    • Springer-Verlag
    • G. Lowe. Breaking and fixing the Needham-Schröeder algorithm. In Proc. of TACAS'96, pages 147-166. Springer-Verlag, 1996.
    • (1996) Proc. of TACAS'96 , pp. 147-166
    • Lowe, G.1
  • 18
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
    • D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-129
    • Micciancio, D.1    Warinschi, B.2
  • 19
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 20
    • 84974554584 scopus 로고
    • Noninteractive zero-knowledge proofs of knowledfe and chosen ciphertext attack
    • C. Rackoff and D. Simon. Noninteractive zero-knowledge proofs of knowledfe and chosen ciphertext attack. In CRYPTO'91, pages 433-444, 1991.
    • (1991) CRYPTO'91 , pp. 433-444
    • Rackoff, C.1    Simon, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.