-
1
-
-
33646045378
-
Soundness of formal encryption in the presence of key-cycles
-
Proceedings of the 10th European Symposium on Research in Computer Security. De Capitani di Vimercati S., Syverson P.F., and Gollmann D. (Eds). ESORICS'05, Springer Verlag
-
Adão P., Bana G., Herzog J., and Scedrov A. Soundness of formal encryption in the presence of key-cycles. In: De Capitani di Vimercati S., Syverson P.F., and Gollmann D. (Eds). Proceedings of the 10th European Symposium on Research in Computer Security. ESORICS'05. Lecture Notes in Computer Science vol. 3679 (2005), Springer Verlag 374-396
-
(2005)
Lecture Notes in Computer Science
, vol.3679
, pp. 374-396
-
-
Adão, P.1
Bana, G.2
Herzog, J.3
Scedrov, A.4
-
3
-
-
33745790245
-
Guessing attacks and the computational soundness of static equivalence
-
9th International Conference on Foundations of Software Science and Computation Structures. Aceto L., and Ingólfsdóttir A. (Eds). FoSSaCS'06, Springer Verlag
-
Abadi M., Baudet M., and Warinschi B. Guessing attacks and the computational soundness of static equivalence. In: Aceto L., and Ingólfsdóttir A. (Eds). 9th International Conference on Foundations of Software Science and Computation Structures. FoSSaCS'06. Lecture Notes in Computer Science vol. 3921 (2006), Springer Verlag 398-412
-
(2006)
Lecture Notes in Computer Science
, vol.3921
, pp. 398-412
-
-
Abadi, M.1
Baudet, M.2
Warinschi, B.3
-
4
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software. Kobayashi N., and Pierce B.C. (Eds). TACS'01, Springer Verlag
-
Abadi M., and Jürjens J. Formal eavesdropping and its computational interpretation. In: Kobayashi N., and Pierce B.C. (Eds). Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software. TACS'01. Lecture Notes in Computer Science vol. 2215 (2001), Springer Verlag 82-94
-
(2001)
Lecture Notes in Computer Science
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
5
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Abadi M., and Rogaway P. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15 2 (2002) 103-127
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
7
-
-
40049087147
-
-
Gergei Bana, Soundness and Completeness of Formal Logics of Symmetric Encryption, Ph.D. Thesis, University of Pennsylvania, 2004
-
Gergei Bana, Soundness and Completeness of Formal Logics of Symmetric Encryption, Ph.D. Thesis, University of Pennsylvania, 2004
-
-
-
-
8
-
-
26444541858
-
Computationally sound implementations of equational theories against passive adversaries
-
Proceedings of the 32nd International Colloquium on Automata, Languages and Programming. Caires L., Italiano G.F., Monteiro L., Palamidessi C., and Yung M. (Eds). ICALP'05, Springer Verlag
-
Baudet M., Cortier V., and Kremer S. Computationally sound implementations of equational theories against passive adversaries. In: Caires L., Italiano G.F., Monteiro L., Palamidessi C., and Yung M. (Eds). Proceedings of the 32nd International Colloquium on Automata, Languages and Programming. ICALP'05. Lecture Notes in Computer Science vol. 3580 (2005), Springer Verlag 652-663
-
(2005)
Lecture Notes in Computer Science
, vol.3580
, pp. 652-663
-
-
Baudet, M.1
Cortier, V.2
Kremer, S.3
-
9
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
FOCS'97, IEEE
-
Bellare M., Desai A., Jokipii E., and Rogaway P. A concrete security treatment of symmetric encryption. Proceedings of the 38th Annual Symposium on Foundations of Computer Science. FOCS'97 (1997), IEEE 394-405
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science
, pp. 394-405
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
10
-
-
38049082991
-
A generalization of DDH with applications to protocol analysis and computational soundness
-
Proceedings the IACR International Conference: Advances in Cryptology. Menezes A.J. (Ed). CRYPTO'07, Springer Verlag
-
Bresson E., Lakhnech Y., Mazaré L., and Warinschi B. A generalization of DDH with applications to protocol analysis and computational soundness. In: Menezes A.J. (Ed). Proceedings the IACR International Conference: Advances in Cryptology. CRYPTO'07. Lecture Notes in Computer Science (2007), Springer Verlag
-
(2007)
Lecture Notes in Computer Science
-
-
Bresson, E.1
Lakhnech, Y.2
Mazaré, L.3
Warinschi, B.4
-
11
-
-
33750265393
-
Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes
-
Proceedings of the 11th European Symposium on Research in Computer Security. Gollmann D., Meier J., and Sabelfeld A. (Eds). ESORICS'06, Springer Verlag
-
Backes M., Pfitzmann B., and Waidner M. Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes. In: Gollmann D., Meier J., and Sabelfeld A. (Eds). Proceedings of the 11th European Symposium on Research in Computer Security. ESORICS'06. Lecture Notes in Computer Science vol. 4189 (2006), Springer Verlag 404-423
-
(2006)
Lecture Notes in Computer Science
, vol.4189
, pp. 404-423
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
13
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
Advances in Cryptology. Kaliski B. (Ed). CRYPTO'97, Springer Verlag
-
Canetti R. Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski B. (Ed). Advances in Cryptology. CRYPTO'97. Lecture Notes in Computer Science vol. 1294 (1997), Springer Verlag 455-469
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
14
-
-
40049093887
-
-
Ran Canetti, Towards realizing random oracles: Hash functions that hide all partial information, Cryptology ePrint Archive, Report 1997/007. http://eprint.iacr.org/1997/007, 1997
-
Ran Canetti, Towards realizing random oracles: Hash functions that hide all partial information, Cryptology ePrint Archive, Report 1997/007. http://eprint.iacr.org/1997/007, 1997
-
-
-
-
15
-
-
4243180376
-
The random oracle methodology, revisited
-
Canetti R., Goldreich O., and Halevi S. The random oracle methodology, revisited. Journal of the ACM 51 4 (2004) 557-594
-
(2004)
Journal of the ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
16
-
-
84962447835
-
Computationally sound symbolic secrecy in the presence of hash functions
-
Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science. Garg N., and Arun-Kumar S. (Eds). FSTTCS'06, Springer Verlag
-
Cortier V., Kremer S., Küsters R., and Warinschi B. Computationally sound symbolic secrecy in the presence of hash functions. In: Garg N., and Arun-Kumar S. (Eds). Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science. FSTTCS'06. Lecture Notes in Computer Science vol. 4337 (2006), Springer Verlag 176-187
-
(2006)
Lecture Notes in Computer Science
, vol.4337
, pp. 176-187
-
-
Cortier, V.1
Kremer, S.2
Küsters, R.3
Warinschi, B.4
-
20
-
-
40049104910
-
-
Shafi Goldwasser, Mihir Bellare, Lecture Notes on Cryptography. http://www-cse.ucsd.edu/~mihir/papers/gb.html, 2001
-
Shafi Goldwasser, Mihir Bellare, Lecture Notes on Cryptography. http://www-cse.ucsd.edu/~mihir/papers/gb.html, 2001
-
-
-
-
23
-
-
33845272534
-
Sound computational interpretation of symbolic hashes in the standard model
-
Advances in Information and Computer Security. International Workshop on Security. Yoshiura H., Sakurai K., Rannenberg K., Murayama Y., and Kawamura S. (Eds). IWSEC'06, Springer Verlag
-
Garcia F.D., and van Rossum P. Sound computational interpretation of symbolic hashes in the standard model. In: Yoshiura H., Sakurai K., Rannenberg K., Murayama Y., and Kawamura S. (Eds). Advances in Information and Computer Security. International Workshop on Security. IWSEC'06. Lecture Notes in Computer Science vol. 4266 (2006), Springer Verlag 33-47
-
(2006)
Lecture Notes in Computer Science
, vol.4266
, pp. 33-47
-
-
Garcia, F.D.1
van Rossum, P.2
-
24
-
-
18544364489
-
A computational interpretation of Dolev-Yao adversaries
-
Herzog J. A computational interpretation of Dolev-Yao adversaries. Theoretical Computer Science 340 1 (2005) 57-81
-
(2005)
Theoretical Computer Science
, vol.340
, Issue.1
, pp. 57-81
-
-
Herzog, J.1
-
25
-
-
34347205954
-
Computational soundness of symbolic analysis for protocols using hash functions
-
Proceedings of the First Workshop in Information and Computer Security. ICS'06
-
Janvier R., Lakhnech Y., and Mazaré L. Computational soundness of symbolic analysis for protocols using hash functions. Proceedings of the First Workshop in Information and Computer Security. ICS'06. Electronic Notes in Theoretical Computer Science vol. 186 (2007) 121-139
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.186
, pp. 121-139
-
-
Janvier, R.1
Lakhnech, Y.2
Mazaré, L.3
-
26
-
-
38049000874
-
Adaptive soundness of static equivalence
-
Proceedings of the 12th European Symposium on Research in Computer Security. Biskup J. (Ed). ESORICS'07, Springer Verlag
-
Kremer S., and Mazaré L. Adaptive soundness of static equivalence. In: Biskup J. (Ed). Proceedings of the 12th European Symposium on Research in Computer Security. ESORICS'07. Lecture Notes in Computer Science vol. 4734 (2007), Springer Verlag 610-625
-
(2007)
Lecture Notes in Computer Science
, vol.4734
, pp. 610-625
-
-
Kremer, S.1
Mazaré, L.2
-
27
-
-
40049096796
-
-
Laurent Mazaré, Computationally sound analysis of protocols using bilinear pairings, in: Riccardo Focardi (Eds.) Preliminary Proceedings of the 7th International Workshop on Issues in the Theory of Security, WITS'07, 2007, pp. 6-21
-
Laurent Mazaré, Computationally sound analysis of protocols using bilinear pairings, in: Riccardo Focardi (Eds.) Preliminary Proceedings of the 7th International Workshop on Issues in the Theory of Security, WITS'07, 2007, pp. 6-21
-
-
-
-
28
-
-
24144482305
-
Adaptive security of symbolic encryption
-
Proceedings of the 2nd Theory of Cryptography Conference. Kilian J. (Ed). TCC'05, Springer Verlag
-
Micciancio D., and Panjwani S. Adaptive security of symbolic encryption. In: Kilian J. (Ed). Proceedings of the 2nd Theory of Cryptography Conference. TCC'05. Lecture Notes in Computer Science vol. 3378 (2005), Springer Verlag 169-187
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 169-187
-
-
Micciancio, D.1
Panjwani, S.2
-
29
-
-
0344875571
-
Completeness theorems of the Abadi-Rogaway logic of encrypted expressions
-
Micciancio D., and Warinschi B. Completeness theorems of the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security 12 1 (2004) 99-129
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 99-129
-
-
Micciancio, D.1
Warinschi, B.2
-
30
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Proceedings of the 1st Theory of Cryptography Conference. Naor M. (Ed). TCC'04, Springer Verlag
-
Micciancio D., and Warinschi B. Soundness of formal encryption in the presence of active adversaries. In: Naor M. (Ed). Proceedings of the 1st Theory of Cryptography Conference. TCC'04. Lecture Notes in Computer Science vol. 2951 (2004), Springer Verlag 133-151
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
31
-
-
0034447081
-
-
Birgit Pfitzmann, Michael Waidner, Composition and integrity preservation of secure reactive systems, in: Proceedings of the 7th ACM Conference on Computer and Communication Security, CCS'00, 2000, pp. 245-254
-
Birgit Pfitzmann, Michael Waidner, Composition and integrity preservation of secure reactive systems, in: Proceedings of the 7th ACM Conference on Computer and Communication Security, CCS'00, 2000, pp. 245-254
-
-
-
-
32
-
-
35048855067
-
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
-
Proceedings of the 11th Fast Software Encryption. Roy B., and Meier W. (Eds). FSE'04, Springer Verlag
-
Rogaway P., and Shrimpton T. Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy B., and Meier W. (Eds). Proceedings of the 11th Fast Software Encryption. FSE'04. Lecture Notes in Computer Science vol. 3017 (2004), Springer Verlag 371-388
-
(2004)
Lecture Notes in Computer Science
, vol.3017
, pp. 371-388
-
-
Rogaway, P.1
Shrimpton, T.2
-
33
-
-
0020301290
-
-
Andrew C. Yao, Theory and applications of trapdoor functions, in: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, FOCS'82, 1982, pp. 80-91
-
Andrew C. Yao, Theory and applications of trapdoor functions, in: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, FOCS'82, 1982, pp. 80-91
-
-
-
|