메뉴 건너뛰기




Volumn 4734 LNCS, Issue , 2007, Pages 219-234

Inductive proofs of computational secrecy

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTATIONAL METHODS; DATA TRANSFER; NETWORK SECURITY; POLYNOMIALS;

EID: 38049030237     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74835-9_15     Document Type: Conference Paper
Times cited : (13)

References (33)
  • 1
    • 38049016922 scopus 로고    scopus 로고
    • IEEE P802.11i/D10.0: Medium Access Control (MAC) security enhancements, amendment 6 to IEEE Standard for local and metropolitan area networks part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications (April 2004)
    • IEEE P802.11i/D10.0: Medium Access Control (MAC) security enhancements, amendment 6 to IEEE Standard for local and metropolitan area networks part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications (April 2004)
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 38049032401 scopus 로고    scopus 로고
    • Backes, M., Pfitzmann, B.: Limits of the cryptographic realization of XOR. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, 3679, Springer, Heidelberg (2005)
    • Backes, M., Pfitzmann, B.: Limits of the cryptographic realization of XOR. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, Springer, Heidelberg (2005)
  • 6
    • 32844458560 scopus 로고    scopus 로고
    • A universally composable cryptographic library. Cryptology ePrint Archive
    • Report 2003/015
    • Backes, M., Pfitzmann, B., Waidner, M.: A universally composable cryptographic library. Cryptology ePrint Archive, Report 2003/015 (2003)
    • (2003)
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 7
    • 38049053072 scopus 로고    scopus 로고
    • Limits of the reactive simulatability/uc of dolev-yao models with hashes
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Backes, M., Pfitzmann, B., Waidner, M.: Limits of the reactive simulatability/uc of dolev-yao models with hashes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 8
    • 26444541858 scopus 로고    scopus 로고
    • Computationally Sound Implementations of Equational Theories against Passive Adversaries
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Baudet, M., Cortier, V., Kremer, S.: Computationally Sound Implementations of Equational Theories against Passive Adversaries. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580
    • Baudet, M.1    Cortier, V.2    Kremer, S.3
  • 9
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259-274. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 10
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Okamoto, T, ed, ASI-ACRYPT 2000, Springer, Heidelberg
    • Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASI-ACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 11
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 12
    • 35048902360 scopus 로고    scopus 로고
    • Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A.: Verifying confidentiality and authentication in kerberos 5. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, 3233, pp. 1-24. Springer, Heidelberg (2004)
    • Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A.: Verifying confidentiality and authentication in kerberos 5. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, vol. 3233, pp. 1-24. Springer, Heidelberg (2004)
  • 13
    • 33745528593 scopus 로고    scopus 로고
    • Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 380-403. Springer, Heidelberg (2006)
    • Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 380-403. Springer, Heidelberg (2006)
  • 14
    • 24644437051 scopus 로고    scopus 로고
    • Cortier, V., Warinschi, B.: Computationally sound, automated proofs for security protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 157-171. Springer, Heidelberg (2005)
    • Cortier, V., Warinschi, B.: Computationally sound, automated proofs for security protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 157-171. Springer, Heidelberg (2005)
  • 15
    • 33745534937 scopus 로고    scopus 로고
    • Datta, A., Derek, A., Mitchell, J., Ramanathan, A., Scedrov, A.: Games and the impossibility of realizable ideal functionality. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, Springer, Heidelberg (2006)
    • Datta, A., Derek, A., Mitchell, J., Ramanathan, A., Scedrov, A.: Games and the impossibility of realizable ideal functionality. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, Springer, Heidelberg (2006)
  • 17
    • 26444565771 scopus 로고    scopus 로고
    • Probabilistic polynomial-time semantics for a protocol security logic
    • Caires, L, Italiano, GF, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Datta, A., Derek, A., Mitchell, J.C. Shmatikov, V., Turuani, M.: Probabilistic polynomial-time semantics for a protocol security logic. In: Caires, L., Italiano, GF., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 16-29. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 16-29
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Shmatikov, V.4    Turuani, M.5
  • 22
    • 26444560455 scopus 로고    scopus 로고
    • Strand spaces and rank functions: More than distant cousins
    • Heather, J.: Strand spaces and rank functions: More than distant cousins. In: Proceedings of CSFW, p. 104 (2002)
    • (2002) Proceedings of CSFW , pp. 104
    • Heather, J.1
  • 23
    • 84974720881 scopus 로고    scopus 로고
    • Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Schneier, B. (ed.) FSE 2000. LNCS, 1978, pp. 284-299. Springer, Heidelberg (2001)
    • Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 284-299. Springer, Heidelberg (2001)
  • 27
    • 35048899313 scopus 로고    scopus 로고
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, Springer, Heidelberg (2004)
    • Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, Springer, Heidelberg (2004)
  • 28
    • 70349233292 scopus 로고    scopus 로고
    • Deriving secrecy properties in key establishment protocols
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Pavlovic, D., Meadows, C.: Deriving secrecy properties in key establishment protocols. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189
    • Pavlovic, D.1    Meadows, C.2
  • 32
    • 84942255620 scopus 로고    scopus 로고
    • A computational analysis of the Needham-Schroeder(-Lowe) protocol
    • ACM Press, New York
    • Warinschi, B.: A computational analysis of the Needham-Schroeder(-Lowe) protocol. In: Proceedings of 16th Computer Science Foundation Workshop, pp. 248-262. ACM Press, New York (2003)
    • (2003) Proceedings of 16th Computer Science Foundation Workshop , pp. 248-262
    • Warinschi, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.