-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi-calculus
-
M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi-calculus. Information and Computation, 143:1-70, 1999.
-
(1999)
Information and Computation
, vol.143
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
2
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
84937407919
-
Deriving cryptographically sound implementations using composition and formally verified bisimulation
-
Formal Methods Europe, Springer-Verlag
-
M. Backes, C. Jacobi, and B. Pfitzmann. Deriving cryptographically sound implementations using composition and formally verified bisimulation. In Formal Methods Europe, volume 2931 of Lecture Notes in Computer Science, pages 310-329. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2931
, pp. 310-329
-
-
Backes, M.1
Jacobi, C.2
Pfitzmann, B.3
-
5
-
-
85029542707
-
Foundations of secure interactive computing
-
Crypto'91, Springer-Verlag
-
D. Beaver. Foundations of secure interactive computing. In Crypto'91, volume 576 of Lecture Notes in Computer Science, pages 377-391. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
6
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4:75-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 75-122
-
-
Beaver, D.1
-
7
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Press, Full paper
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42-nd Annual Symposium on Foundations of Computer Science (FOCS), pages 136-145. IEEE Press, 2001. Full paper available at eprint.iacr.org as 2000/067.
-
(2001)
42-nd Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 136-145
-
-
Canetti, R.1
-
8
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Eurocrypt'01, Springer-Verlag
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Eurocrypt'01, volume 2045 of Lecture Notes in Computer Science, pages 453-474. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
Full paper
-
R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally composable two-party and multi-party secure computation. In 34-th ACM Symposium on Theory of Computing, pages 484-503, 2002. Full paper available at eprint.iacr.org as 2002/140.
-
(2002)
34-th ACM Symposium on Theory of Computing
, pp. 484-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
11
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31:469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
12
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
15
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Crypto'90, Springer-Verlag
-
S. Goldwasser and L. Levin. Fair computation of general functions in presence of immoral majority. In Crypto'90, volume 537 of Lecture Notes in Computer Science, pages 77-93. Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
16
-
-
0032218226
-
Probabilistic polynomial-time framework for protocol analysis
-
M. Reiter, editor, ACM Press
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. Probabilistic polynomial-time framework for protocol analysis. In M. Reiter, editor, 5-th ACM Conferece on Computer and Communication Security, pages 112-121. ACM Press, 1998.
-
(1998)
5-th ACM Conferece on Computer and Communication Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
17
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
Formal Methods in the Development of Computing Systems, Spriger-Verlag
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. Probabilistic polynomial-time equivalence and security analysis. In Formal Methods in the Development of Computing Systems, volume 1708 of Lecture Notes in Computer Science, pages 776-793. Spriger-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1708
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
19
-
-
0035598191
-
Probabilistic situation calculus
-
P. Mateus, A. Pacheco, J. Pinto, A. Sernadas, and C. Sernadas. Probabilistic situation calculus. Annals of Mathematics and Artificial Intelligence, 32(1):393-431, 2001.
-
(2001)
Annals of Mathematics and Artificial Intelligence
, vol.32
, Issue.1
, pp. 393-431
-
-
Mateus, P.1
Pacheco, A.2
Pinto, J.3
Sernadas, A.4
Sernadas, C.5
-
20
-
-
84974655726
-
Secure computation
-
Crypto'91, Springer-Verlag
-
S. Micali and P. Rogaway. Secure computation. In Crypto'91, volume 576 of Lecture Notes in Computer Science, pages 392-404. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
23
-
-
1442267753
-
A probabilistic polynomial-time calculus for analysis of cryptographic protocols
-
J. Mitchell, A. Ramanathan, A. Scedrov, and V. Teague. A probabilistic polynomial-time calculus for analysis of cryptographic protocols. Electronic Notes in Theoretical Computer Science, 45, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.45
-
-
Mitchell, J.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
24
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-9, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
28
-
-
0029484376
-
Modelling and verifying key-exchange protocols using CSP and FDR
-
IEEE Computer Society Press
-
A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR. In 8-th IEEE Computer Security Foundations Workshop (CSFW). IEEE Computer Society Press, 1995.
-
(1995)
8-th IEEE Computer Security Foundations Workshop (CSFW)
-
-
Roscoe, A.W.1
|