-
1
-
-
84879078812
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
ser. LNCS, J. van Leeuwen, O. Watanabe, M. Hagiya, P. Mosses, and T. Ito, Eds., Sendai, Japan: Springer-Verlag, Aug.
-
M. Abadi and P. Rogaway, "Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)," in International Conference IFIP TCS 2000, ser. LNCS, J. van Leeuwen, O. Watanabe, M. Hagiya, P. Mosses, and T. Ito, Eds., vol. 1872. Sendai, Japan: Springer-Verlag, Aug. 2000, pp. 3-22.
-
(2000)
International Conference IFIP TCS 2000
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
ser. LNCS, N. Kobayashi and B. Pierce, Eds., Sendai, Japan: Springer-Verlag, Sept.
-
M. Abadi and J. Jürjens, "Formal Eavesdropping and Its Computational Interpretation," in Theoretical Aspects of Computer Software, 4th International Symposium, TACS 2001, ser. LNCS, N. Kobayashi and B. Pierce, Eds., vol. 2215. Sendai, Japan: Springer-Verlag, Sept. 2001, pp. 82-94.
-
(2001)
Theoretical Aspects of Computer Software, 4th International Symposium, TACS 2001
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
4
-
-
3543113495
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
27 Feb.
-
P. Laud, "Symmetric encryption in automatic analyses for confidentiality against active adversaries," Cybernetica, Tech. Rep. IT-AR-0-030-040227, 27 Feb. 2004.
-
(2004)
Cybernetica, Tech. Rep.
, vol.IT-AR-0-030-040227
-
-
Laud, P.1
-
5
-
-
3543080709
-
-
Ph.D. dissertation, Universität des Saarlandes
-
_, "Computationally Secure Information Flow," Ph.D. dissertation, Universität des Saarlandes, 2002.
-
(2002)
Computationally Secure Information Flow
-
-
-
6
-
-
35248840989
-
Handling encryption in analyses for secure information flow
-
ser. LNCS, P. Degano, Ed., Warsaw, Poland: Springer-Verlag, Apr.
-
_, "Handling Encryption in Analyses for Secure Information Flow," in Programming Languages and Systems. 12th European Symposium on Programming, ESOP 2003, ser. LNCS, P. Degano, Ed., vol. 2618. Warsaw, Poland: Springer-Verlag, Apr. 2003, pp. 159-173.
-
(2003)
Programming Languages and Systems. 12th European Symposium on Programming, ESOP 2003
, vol.2618
, pp. 159-173
-
-
-
7
-
-
0005076119
-
Cryptographic security of reactive systems
-
ser. Electronic Notes in Theoretical Computer Science, S. Schneider and P. Ryan, Eds., Royal Holloway, University of London: Elsevier Science
-
B. Pfitzmann, M. Schunter, and M. Waidner, "Cryptographic Security of Reactive Systems," in Workshop on Secure Architectures and Information Flow, ser. Electronic Notes in Theoretical Computer Science, S. Schneider and P. Ryan, Eds., vol. 32. Royal Holloway, University of London: Elsevier Science, 2000.
-
(2000)
Workshop on Secure Architectures and Information Flow
, vol.32
-
-
Pfitzmann, B.1
Schunter, M.2
Waidner, M.3
-
8
-
-
0034447081
-
Composition and integrity preservation of secure reactive systems
-
Athens, Greece: ACM Press, Nov.
-
B. Pfitzmann and M. Waidner, "Composition and integrity preservation of secure reactive systems," in CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security. Athens, Greece: ACM Press, Nov. 2000, pp. 245-254.
-
(2000)
CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Pfitzmann, B.1
Waidner, M.2
-
9
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
Oakland, California: IEEE Computer Society Press, May
-
_, "A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission," in 2001 IEEE Symposium on Security and Privacy. Oakland, California: IEEE Computer Society Press, May 2001, pp. 184-200.
-
(2001)
2001 IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
-
11
-
-
35248899328
-
Cryptographically sound and machine-assisted verification of security protocols
-
LNCS, H. Alt and M. Habib, Eds., Berlin, Germany: Springer-Verlag, Feb.
-
M. Backes and C. Jacobi II, "Cryptographically Sound and Machine-Assisted Verification of Security Protocols," in STACS 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, ser. LNCS, H. Alt and M. Habib, Eds., vol. 2607. Berlin, Germany: Springer-Verlag, Feb. 2003, pp. 675-686.
-
(2003)
STACS 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Ser.
, vol.2607
, pp. 675-686
-
-
Backes, M.1
Jacobi II, C.2
-
12
-
-
32844458560
-
A universally composable cryptographic library
-
Washington, DC: ACM Press, Oct.
-
M. Backes, B. Pfitzmann, and M. Waidner, "A Universally Composable Cryptographic Library," in Proceedings of the 10th ACM Conference on Computer and Communications Security. Washington, DC: ACM Press, Oct. 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
14
-
-
0142250274
-
Symmetric authentication within a simulatable cryptographic library
-
ser. LNCS, E. Snekkenes and D. Gollmann, Eds., Gjøvik, Norway: Springer-Verlag, Oct.
-
M. Backes, B. Pfitzmann, and M. Waidner, "Symmetric authentication within a simulatable cryptographic library," in Computer Security ESORICS 2003, 8th European Symposium on Research in Computer Security, ser. LNCS, E. Snekkenes and D. Gollmann, Eds., vol. 2808. Gjøvik, Norway: Springer-Verlag, Oct. 2003, pp. 271-290.
-
(2003)
Computer Security ESORICS 2003, 8th European Symposium on Research in Computer Security
, vol.2808
, pp. 271-290
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
15
-
-
19744369525
-
Symmetric encryption in a simulatable dolev-yao style cryptographic library
-
M. Backes and B. Pfitzmann, "Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library," Cryptology ePrint Archive, Report 2004/059, 2004, http://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.59
-
-
Backes, M.1
Pfitzmann, B.2
-
17
-
-
84880897758
-
Universally composable commitments
-
ser. LNCS, J. Kilian, Ed., Santa Barbara, California: Springer-Verlag, Aug.
-
R. Canetti and M. Fischlin, "Universally Composable Commitments," in Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, ser. LNCS, J. Kilian, Ed., vol. 2139. Santa Barbara, California: Springer-Verlag, Aug. 2001, pp. 19-40.
-
(2001)
Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
18
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
ser. LNCS, L. R. Knudsen, Ed., Amsterdam, The Netherlands: Springer-Verlag, Apr.
-
R. Canetti and H. Krawczyk, "Universally Composable Notions of Key Exchange and Secure Channels," in Advances in Cryptology - EURO-CRYPT 2002, International Conference on the Theory and Application of Cryptographic Techniques, ser. LNCS, L. R. Knudsen, Ed., vol. 2332. Amsterdam, The Netherlands: Springer-Verlag, Apr. 2002, pp. 337-351.
-
(2002)
Advances in Cryptology - EURO-CRYPT 2002, International Conference on the Theory and Application of Cryptographic Techniques
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
19
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
Montreal, Quebec: ACM, May
-
R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai, "Universally composable two-party and multi-party secure computation," in Proceedings on 34th Annual ACM Symposium on Theory of Computing. Montreal, Quebec: ACM, May 2002, pp. 494-503.
-
(2002)
Proceedings on 34th Annual ACM Symposium on Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
21
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
ser. LNCS, H. Krawczyk, Ed., Santa Barbara, California: Springer-Verlag, Aug.
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, "Relations among Notions of Security for Public-Key Encryption Schemes," in Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, ser. LNCS, H. Krawczyk, Ed., vol. 1462. Santa Barbara, California: Springer-Verlag, Aug. 1998, pp. 26-45.
-
(1998)
Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
22
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Fairfax, Virginia: ACM Press, Nov.
-
M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," in CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security. Fairfax, Virginia: ACM Press, Nov. 1993, pp. 62-73.
-
(1993)
CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
23
-
-
35248848005
-
Plaintext awareness via key registration
-
ser. LNCS, D. Boneh, Ed., Santa Barbara, California: Springer-Verlag, Aug.
-
J. Herzog, M. Liskov, and S. Micali, "Plaintext Awareness via Key Registration," in Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, ser. LNCS, D. Boneh, Ed., vol. 2729. Santa Barbara, California: Springer-Verlag, Aug. 2003, pp. 548-564.
-
(2003)
Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference
, vol.2729
, pp. 548-564
-
-
Herzog, J.1
Liskov, M.2
Micali, S.3
-
24
-
-
84937407719
-
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
-
ser. LNCS, T. Okamoto, Ed., Kyoto, Japan: Springer-Verlag, Dec.
-
M. Bellare and C. Namprempre, "Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm," in Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, ser. LNCS, T. Okamoto, Ed., vol. 1976. Kyoto, Japan: Springer-Verlag, Dec. 2000, pp. 531-545.
-
(2000)
Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
25
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
Miami Beach, Florida: IEEE Computer Society Press, Oct.
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, "A Concrete Security Treatment of Symmetric Encryption," in 38th Annual Symposium on Foundations of Computer Science. Miami Beach, Florida: IEEE Computer Society Press, Oct. 1997, pp. 394-403.
-
(1997)
38th Annual Symposium on Foundations of Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
26
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
Baltimore, Maryland: ACM Press, May
-
M. Naor and M. Yung, "Public-key cryptosystems provably secure against chosen ciphertext attacks," in Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing. Baltimore, Maryland: ACM Press, May 1990, pp. 427-437.
-
(1990)
Proceedings of the Twenty-second Annual ACM Symposium on Theory of Computing
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
27
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
ser. LNCS, J. Feigenbaum, Ed., Santa Barbara, California: Springer-Verlag, Aug.
-
C. Rackoff and D. R. Simon, "Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack," in Advances in Cryptology CRYPTO '91, 11th Annual International Cryptology Conference, ser. LNCS, J. Feigenbaum, Ed., vol. 576. Santa Barbara, California: Springer-Verlag, Aug. 1991, pp. 433-444.
-
(1991)
Advances in Cryptology CRYPTO '91, 11th Annual International Cryptology Conference
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
28
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F. Thayer, J. Herzog, and J. Guttman, "Strand Spaces: Proving Security Protocols Correct," Journal of Computer Security, vol. 7, no. 2/3, pp. 191-230, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Thayer, F.1
Herzog, J.2
Guttman, J.3
-
29
-
-
0001940580
-
Provably secure session key distribution - The three party case
-
Las Vegas, Nevada: ACM Press, June
-
M. Bellare and P. Rogaway, "Provably secure session key distribution - The three party case," in Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing. Las Vegas, Nevada: ACM Press, June 1995, pp. 57-66.
-
(1995)
Proceedings of the Twenty-seventh Annual ACM Symposium on Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
30
-
-
0020301290
-
Theory and applications of trapdoor functions (extended abstract)
-
Chicago, Illinois: IEEE Computer Society Press, Nov.
-
A. Yao, "Theory and applications of trapdoor functions (extended abstract)," in 23rd Annual Symposium on Foundations of Computer Science. Chicago, Illinois: IEEE Computer Society Press, Nov. 1982, pp. 80-91.
-
(1982)
23rd Annual Symposium on Foundations of Computer Science
, pp. 80-91
-
-
Yao, A.1
-
31
-
-
84957588448
-
A semantic approach to secure information flow
-
ser. LNCS, J. Jeuring, Ed., Marstrand, Sweden: Springer-Verlag, June
-
K. Leino and R. Joshi, "A Semantic Approach to Secure Information Flow," in Mathematics of Program Construction, MPC '98, ser. LNCS, J. Jeuring, Ed., vol. 1422. Marstrand, Sweden: Springer-Verlag, June 1998, pp. 254-271.
-
(1998)
Mathematics of Program Construction, MPC '98
, vol.1422
, pp. 254-271
-
-
Leino, K.1
Joshi, R.2
-
32
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
San Francisco, California: ACM Press, Nov.
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov, "A Probabilistic Poly-Time Framework for Protocol Analysis," in CCS '98, Proceedings of the 5th ACM Conference on Computer and Communications Security. San Francisco, California: ACM Press, Nov. 1998, pp. 112-121.
-
(1998)
CCS '98, Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
33
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon, "A Mathematical Theory of Communication," Bell System Technical Journal, vol. 27, pp. 379-423 and 623-656, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
34
-
-
0016949746
-
A lattice model of secure information flow
-
D. Denning, "A Lattice Model of Secure Information Flow," Communications of the ACM, vol. 19, no. 5, pp. 236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
35
-
-
0017517624
-
Certification of programs for secure information flow
-
D. Denning and P. Denning, "Certification of Programs for Secure Information Flow," Communications of the ACM, vol. 20, no. 7, pp. 504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
36
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine, "A Sound Type System for Secure Flow Analysis," Journal of Computer Security, vol. 4, no. 2, 3, pp. 167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|