메뉴 건너뛰기




Volumn 2004, Issue , 2004, Pages 71-85

Symmetric encryption in automatic analyses for confidentiality against active adversaries

Author keywords

[No Author keywords available]

Indexed keywords

ADVERSARIES; COMPUTATIONAL MODELS; CRYPTOGRAPHIC PROTOCOLS; SYMMETRIC ENCRYPTION;

EID: 3543052976     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2004.1301316     Document Type: Conference Paper
Times cited : (70)

References (36)
  • 1
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • ser. LNCS, J. van Leeuwen, O. Watanabe, M. Hagiya, P. Mosses, and T. Ito, Eds., Sendai, Japan: Springer-Verlag, Aug.
    • M. Abadi and P. Rogaway, "Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)," in International Conference IFIP TCS 2000, ser. LNCS, J. van Leeuwen, O. Watanabe, M. Hagiya, P. Mosses, and T. Ito, Eds., vol. 1872. Sendai, Japan: Springer-Verlag, Aug. 2000, pp. 3-22.
    • (2000) International Conference IFIP TCS 2000 , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 2
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • ser. LNCS, N. Kobayashi and B. Pierce, Eds., Sendai, Japan: Springer-Verlag, Sept.
    • M. Abadi and J. Jürjens, "Formal Eavesdropping and Its Computational Interpretation," in Theoretical Aspects of Computer Software, 4th International Symposium, TACS 2001, ser. LNCS, N. Kobayashi and B. Pierce, Eds., vol. 2215. Sendai, Japan: Springer-Verlag, Sept. 2001, pp. 82-94.
    • (2001) Theoretical Aspects of Computer Software, 4th International Symposium, TACS 2001 , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 4
    • 3543113495 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • 27 Feb.
    • P. Laud, "Symmetric encryption in automatic analyses for confidentiality against active adversaries," Cybernetica, Tech. Rep. IT-AR-0-030-040227, 27 Feb. 2004.
    • (2004) Cybernetica, Tech. Rep. , vol.IT-AR-0-030-040227
    • Laud, P.1
  • 5
    • 3543080709 scopus 로고    scopus 로고
    • Ph.D. dissertation, Universität des Saarlandes
    • _, "Computationally Secure Information Flow," Ph.D. dissertation, Universität des Saarlandes, 2002.
    • (2002) Computationally Secure Information Flow
  • 6
    • 35248840989 scopus 로고    scopus 로고
    • Handling encryption in analyses for secure information flow
    • ser. LNCS, P. Degano, Ed., Warsaw, Poland: Springer-Verlag, Apr.
    • _, "Handling Encryption in Analyses for Secure Information Flow," in Programming Languages and Systems. 12th European Symposium on Programming, ESOP 2003, ser. LNCS, P. Degano, Ed., vol. 2618. Warsaw, Poland: Springer-Verlag, Apr. 2003, pp. 159-173.
    • (2003) Programming Languages and Systems. 12th European Symposium on Programming, ESOP 2003 , vol.2618 , pp. 159-173
  • 7
    • 0005076119 scopus 로고    scopus 로고
    • Cryptographic security of reactive systems
    • ser. Electronic Notes in Theoretical Computer Science, S. Schneider and P. Ryan, Eds., Royal Holloway, University of London: Elsevier Science
    • B. Pfitzmann, M. Schunter, and M. Waidner, "Cryptographic Security of Reactive Systems," in Workshop on Secure Architectures and Information Flow, ser. Electronic Notes in Theoretical Computer Science, S. Schneider and P. Ryan, Eds., vol. 32. Royal Holloway, University of London: Elsevier Science, 2000.
    • (2000) Workshop on Secure Architectures and Information Flow , vol.32
    • Pfitzmann, B.1    Schunter, M.2    Waidner, M.3
  • 9
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • Oakland, California: IEEE Computer Society Press, May
    • _, "A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission," in 2001 IEEE Symposium on Security and Privacy. Oakland, California: IEEE Computer Society Press, May 2001, pp. 184-200.
    • (2001) 2001 IEEE Symposium on Security and Privacy , pp. 184-200
  • 11
    • 35248899328 scopus 로고    scopus 로고
    • Cryptographically sound and machine-assisted verification of security protocols
    • LNCS, H. Alt and M. Habib, Eds., Berlin, Germany: Springer-Verlag, Feb.
    • M. Backes and C. Jacobi II, "Cryptographically Sound and Machine-Assisted Verification of Security Protocols," in STACS 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, ser. LNCS, H. Alt and M. Habib, Eds., vol. 2607. Berlin, Germany: Springer-Verlag, Feb. 2003, pp. 675-686.
    • (2003) STACS 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Ser. , vol.2607 , pp. 675-686
    • Backes, M.1    Jacobi II, C.2
  • 14
    • 0142250274 scopus 로고    scopus 로고
    • Symmetric authentication within a simulatable cryptographic library
    • ser. LNCS, E. Snekkenes and D. Gollmann, Eds., Gjøvik, Norway: Springer-Verlag, Oct.
    • M. Backes, B. Pfitzmann, and M. Waidner, "Symmetric authentication within a simulatable cryptographic library," in Computer Security ESORICS 2003, 8th European Symposium on Research in Computer Security, ser. LNCS, E. Snekkenes and D. Gollmann, Eds., vol. 2808. Gjøvik, Norway: Springer-Verlag, Oct. 2003, pp. 271-290.
    • (2003) Computer Security ESORICS 2003, 8th European Symposium on Research in Computer Security , vol.2808 , pp. 271-290
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 15
    • 19744369525 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable dolev-yao style cryptographic library
    • M. Backes and B. Pfitzmann, "Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library," Cryptology ePrint Archive, Report 2004/059, 2004, http://eprint.iacr.org/.
    • (2004) Cryptology EPrint Archive, Report , vol.2004 , Issue.59
    • Backes, M.1    Pfitzmann, B.2
  • 26
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • Baltimore, Maryland: ACM Press, May
    • M. Naor and M. Yung, "Public-key cryptosystems provably secure against chosen ciphertext attacks," in Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing. Baltimore, Maryland: ACM Press, May 1990, pp. 427-437.
    • (1990) Proceedings of the Twenty-second Annual ACM Symposium on Theory of Computing , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 27
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • ser. LNCS, J. Feigenbaum, Ed., Santa Barbara, California: Springer-Verlag, Aug.
    • C. Rackoff and D. R. Simon, "Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack," in Advances in Cryptology CRYPTO '91, 11th Annual International Cryptology Conference, ser. LNCS, J. Feigenbaum, Ed., vol. 576. Santa Barbara, California: Springer-Verlag, Aug. 1991, pp. 433-444.
    • (1991) Advances in Cryptology CRYPTO '91, 11th Annual International Cryptology Conference , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 28
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • F. Thayer, J. Herzog, and J. Guttman, "Strand Spaces: Proving Security Protocols Correct," Journal of Computer Security, vol. 7, no. 2/3, pp. 191-230, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.2-3 , pp. 191-230
    • Thayer, F.1    Herzog, J.2    Guttman, J.3
  • 30
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions (extended abstract)
    • Chicago, Illinois: IEEE Computer Society Press, Nov.
    • A. Yao, "Theory and applications of trapdoor functions (extended abstract)," in 23rd Annual Symposium on Foundations of Computer Science. Chicago, Illinois: IEEE Computer Society Press, Nov. 1982, pp. 80-91.
    • (1982) 23rd Annual Symposium on Foundations of Computer Science , pp. 80-91
    • Yao, A.1
  • 31
    • 84957588448 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • ser. LNCS, J. Jeuring, Ed., Marstrand, Sweden: Springer-Verlag, June
    • K. Leino and R. Joshi, "A Semantic Approach to Secure Information Flow," in Mathematics of Program Construction, MPC '98, ser. LNCS, J. Jeuring, Ed., vol. 1422. Marstrand, Sweden: Springer-Verlag, June 1998, pp. 254-271.
    • (1998) Mathematics of Program Construction, MPC '98 , vol.1422 , pp. 254-271
    • Leino, K.1    Joshi, R.2
  • 33
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon, "A Mathematical Theory of Communication," Bell System Technical Journal, vol. 27, pp. 379-423 and 623-656, 1948.
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 34
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. Denning, "A Lattice Model of Secure Information Flow," Communications of the ACM, vol. 19, no. 5, pp. 236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.1
  • 35
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. Denning and P. Denning, "Certification of Programs for Secure Information Flow," Communications of the ACM, vol. 20, no. 7, pp. 504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 36
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. Volpano, G. Smith, and C. Irvine, "A Sound Type System for Secure Flow Analysis," Journal of Computer Security, vol. 4, no. 2, 3, pp. 167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.