-
1
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
Sendai, Japan, Oct. Springer-Verlag
-
M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In TACS 2001, volume 2215 of LNCS, pages 82-94, Sendai, Japan, Oct. 2001. Springer-Verlag.
-
(2001)
TACS 2001, Volume 2215 of LNCS
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
5
-
-
84948957152
-
Public-key encryption in a multi-user setting
-
number 1807 in LNCS
-
M. Bellare, A. Boldyreva, and S. Micali. Public-key encryption in a multi-user setting. In Proceedings of EUROCRYPT'00, number 1807 in LNCS, pages 259-274, 2000.
-
(2000)
Proceedings of Eurocrypt
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
9
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of FOCS'01, pages 136-145, 2001.
-
(2001)
Proceedings of FOCS'01
, pp. 136-145
-
-
Canetti, R.1
-
11
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F. J. T. Fabrega, J. Hertzog, and J. Guttman. Strand spaces: Proving security protocols correct. Journal of Computer Security, 7(2/3): 191-230, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Fabrega, F.J.T.1
Hertzog, J.2
Guttman, J.3
-
12
-
-
24144446250
-
Weak Key Authenticity and the Computational Completeness of Formal Encryption
-
D. Boneh, editor, Springer-Verlag, Aug.
-
V. Gligor and D. O. Horvitz. Weak Key Authenticity and the Computational Completeness of Formal Encryption. In D. Boneh, editor, CRYPTO 2003, volume 2729 of LNCS, pages 530-547. Springer-Verlag, Aug. 2003.
-
(2003)
CRYPTO 2003, Volume 2729 of LNCS
, vol.2729
, pp. 530-547
-
-
Gligor, V.1
Horvitz, D.O.2
-
15
-
-
0345412676
-
Logics for reasoning about cryptographic constructions
-
R. Impagliazzo and B. Kapron. Logics for reasoning about cryptographic constructions. In STOC'03, pages 372-383, 2003.
-
(2003)
STOC'03
, pp. 372-383
-
-
Impagliazzo, R.1
Kapron, B.2
-
16
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
San Francisco, California, USA, Nov. ACM
-
P. D. Lincoln, J. C. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Computer and Communications Security - CCS '98, pages 112-121, San Francisco, California, USA, Nov. 1998. ACM.
-
(1998)
Computer and Communications Security - CCS '98
, pp. 112-121
-
-
Lincoln, P.D.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
17
-
-
0003130993
-
Breaking and fixing the Needham-Schröeder algorithm
-
Springer-Verlag
-
G. Lowe. Breaking and fixing the Needham-Schröeder algorithm. In Proc. of TACAS'96, pages 147-166. Springer-Verlag, 1996.
-
(1996)
Proc. of TACAS'96
, pp. 147-166
-
-
Lowe, G.1
-
18
-
-
0344875571
-
Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
-
D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 99-129
-
-
Micciancio, D.1
Warinschi, B.2
-
19
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
20
-
-
84974554584
-
Noninteractive zero-knowledge proofs of knowledfe and chosen ciphertext attack
-
C. Rackoff and D. Simon. Noninteractive zero-knowledge proofs of knowledfe and chosen ciphertext attack. In CRYPTO'91, pages 433-444, 1991.
-
(1991)
CRYPTO'91
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.2
|