-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption). JCRYPTOL
-
Abadi, Rogaway: Reconciling two views of cryptography (the computational soundness of formal encryption). JCRYPTOL: Journal of Cryptology 15 (2002)
-
(2002)
Journal of Cryptology
, vol.15
-
-
Abadi, R.1
-
3
-
-
40249087764
-
Turuani: Compositional analysis of contract-signing protocols. TCS
-
Backes, Datta, Derek, Mitchell, Turuani: Compositional analysis of contract-signing protocols. TCS: Theoretical Computer Science 367 (2006)
-
(2006)
Theoretical Computer Science
, vol.367
-
-
Backes, D.1
Derek, M.2
-
4
-
-
33750251326
-
Conditional Reactive Simulatability
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Backes, M., Dürmuth, M., Hofheinz, D., Küsters, R.: Conditional Reactive Simulatability. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 424-443. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 424-443
-
-
Backes, M.1
Dürmuth, M.2
Hofheinz, D.3
Küsters, R.4
-
5
-
-
35048854169
-
-
Backes, M., Pfitzmann, B., Waidner, M.: A General Composition Theorem for Secure Reactive Systems. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 336 354. Springer, Heidelberg (2004)
-
Backes, M., Pfitzmann, B., Waidner, M.: A General Composition Theorem for Secure Reactive Systems. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 336 354. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
40249085236
-
-
Backes, M., Pfitzmann, B., Waidner, M.: Secure Asynchronous Reactive Systems. Cryptology ePrint Archive, Report, 2004/082 (2004), http://eprint.iacr.org/
-
Backes, M., Pfitzmann, B., Waidner, M.: Secure Asynchronous Reactive Systems. Cryptology ePrint Archive, Report, 2004/082 (2004), http://eprint.iacr.org/
-
-
-
-
7
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
October 20-22, IEEE Computer Society Press, Los Alamitos
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS 1997), October 20-22, IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
8
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 3-540." Springer, Heidelberg (2006), http://dx.doi.org/10.1007/11761679_25
-
(2006)
LNCS
, vol.4004
, pp. 3-540
-
-
Bellare, M.1
Rogaway, P.2
-
11
-
-
32844458303
-
Lindell: On the limitations of universally composable two-party computation without set-up assumptions
-
19th edn
-
Canetti, Kushilevitz, Lindell: On the limitations of universally composable two-party computation without set-up assumptions. In: JCRYPTOL: Journal of Cryptology, 19th edn. (2006)
-
(2006)
JCRYPTOL: Journal of Cryptology
-
-
Canetti, K.1
-
12
-
-
0000731055
-
Security and Composition of Multiparty Cryptographic Protocols
-
Canetti, R.: Security and Composition of Multiparty Cryptographic Protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
13
-
-
84880897758
-
Universally Composable Commitments
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Canetti, R., Fischlin, M.: Universally Composable Commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19 40. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
14
-
-
0035163054
-
-
Canetti, R.: Universally Composable Security: A. New Paradigm for Cryptographic Protocols. In: IEEE Symposium on Foundations of Computer Science, pp. 136-145 (2001) updated version: Cryptology ePrint Archive, Report 2000/067
-
Canetti, R.: Universally Composable Security: A. New Paradigm for Cryptographic Protocols. In: IEEE Symposium on Foundations of Computer Science, pp. 136-145 (2001) updated version: Cryptology ePrint Archive, Report 2000/067
-
-
-
-
15
-
-
40249085237
-
-
Canetti, R., Cheung, L., Kaynar, D.K., Liskov, M., Lynch, N.A., Pereira, O., Segala, R.: Time-bounded task-PIOAs: A framework for analyzing security protocols. In: Dolev, S. (ed.) DISC 2006. LNCS, 41.67, pp. 3-540. Springer, Heidelberg (2006), http://dx.doi.org/10.1007/11864219.17
-
Canetti, R., Cheung, L., Kaynar, D.K., Liskov, M., Lynch, N.A., Pereira, O., Segala, R.: Time-bounded task-PIOAs: A framework for analyzing security protocols. In: Dolev, S. (ed.) DISC 2006. LNCS, vol. 41.67, pp. 3-540. Springer, Heidelberg (2006), http://dx.doi.org/10.1007/11864219.17
-
-
-
-
16
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Secur. 13(3), 423-482 (2005)
-
(2005)
J. Comput. Secur
, vol.13
, Issue.3
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
17
-
-
33745534937
-
-
Datta, A., Derek, A., Mitchell, J.C., Ramanathan, A., Scedrov, A.: Games and the impossibility of realizable ideal functionality. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 360-379. Springer, Heidelberg (2006)
-
Datta, A., Derek, A., Mitchell, J.C., Ramanathan, A., Scedrov, A.: Games and the impossibility of realizable ideal functionality. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 360-379. Springer, Heidelberg (2006)
-
-
-
-
19
-
-
0022793132
-
Micali: How to construct random functions. JACM
-
Goldreich, Goldwasser, Micali: How to construct random functions. JACM: Journal of the ACM 33 (1986)
-
(1986)
Journal of the ACM
, vol.33
-
-
Goldreich, G.1
-
20
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press, New York
-
Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, New York (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
21
-
-
0023545076
-
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or A completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or A completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
-
-
-
-
22
-
-
85050160774
-
-
Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: STOC 1982: Proceedings of the fourteenth annual ACM symposium on Theory of computing, pp. 365-377. ACM Press, New York, USA (1982)
-
Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: STOC 1982: Proceedings of the fourteenth annual ACM symposium on Theory of computing, pp. 365-377. ACM Press, New York, USA (1982)
-
-
-
-
23
-
-
0020877595
-
Strong signature schemes
-
ACM Press, New York, USA
-
Goldwasser, S., Micali, S., Yao, A.: Strong signature schemes. In: STOC 1983: Proceedings of the fifteenth annual ACM symposium on Theory of computing, pp. 431-439. ACM Press, New York, USA (1983)
-
(1983)
STOC 1983: Proceedings of the fifteenth annual ACM symposium on Theory of computing
, pp. 431-439
-
-
Goldwasser, S.1
Micali, S.2
Yao, A.3
-
24
-
-
40249101341
-
-
Halevi, S.: A. plausible approach to computer-aided cryptographic proofs. Report, 2005/181, Cryptology ePrint Archive (June 2005), http ://eprint.iacr.org/2005/181.pdf
-
Halevi, S.: A. plausible approach to computer-aided cryptographic proofs. Report, 2005/181, Cryptology ePrint Archive (June 2005), http ://eprint.iacr.org/2005/181.pdf
-
-
-
-
26
-
-
33750026446
-
-
Herzberg, A., Yoffe, I.: On Secure Orders in the Presence of Faults. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 126-140. Springer, Heidelberg (2006) New version: Foundations of Secure E-Commerce: The Order Layer, in Cryptology ePrint Archive, Report 2006/352.
-
Herzberg, A., Yoffe, I.: On Secure Orders in the Presence of Faults. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 126-140. Springer, Heidelberg (2006) New version: Foundations of Secure E-Commerce: The Order Layer, in Cryptology ePrint Archive, Report 2006/352.
-
-
-
-
27
-
-
40249097041
-
The delivery and evidences layer. Cryptology ePrint Archive
-
Report 2007/139
-
Herzberg, A., Yoffe, I.: The delivery and evidences layer. Cryptology ePrint Archive, Report 2007/139 (2007), http://eprint.iacr.org/
-
(2007)
-
-
Herzberg, A.1
Yoffe, I.2
-
28
-
-
40249090930
-
Layered specifications, design and analysis of security protocols. Cryptology ePrint Archive
-
Report 2006/398
-
Herzberg, A., Yoffe, I.: Layered specifications, design and analysis of security protocols. Cryptology ePrint Archive, Report 2006/398 (2006)
-
(2006)
-
-
Herzberg, A.1
Yoffe, I.2
-
29
-
-
28144438404
-
Polynomial Runtime in Simulatability Definitions
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Hofheinz, D., Müller-Quade, J., Unruh, D.: Polynomial Runtime in Simulatability Definitions. In: CSFW 2005: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW 2005), Washington, DC, USA, pp. 156-169. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
CSFW 2005: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW
, pp. 156-169
-
-
Hofheinz, D.1
Müller-Quade, J.2
Unruh, D.3
-
31
-
-
33947621658
-
Simulation-Based Security with Inexhaustible Interactive Turing Machines
-
Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Küsters, R.: Simulation-Based Security with Inexhaustible Interactive Turing Machines. In: CSFW 2006: Proceedings of the 19th IEEE Workshop on Computer Security Foundations, Washington, DC, USA, pp. 309-320. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
CSFW 2006: Proceedings of the 19th IEEE Workshop on Computer Security Foundations
, pp. 309-320
-
-
Küsters, R.1
-
32
-
-
0032218226
-
-
Lincoln, P., Mitchell, J., Mitchell, M., Scedrov, A.: A. probabilistic poly-time framework for protocol analysis. In: CCS 1998: Proceedings of the 5th ACM conference on Computer and communications security, pp. 112-121. ACM Press, New York (1998)
-
Lincoln, P., Mitchell, J., Mitchell, M., Scedrov, A.: A. probabilistic poly-time framework for protocol analysis. In: CCS 1998: Proceedings of the 5th ACM conference on Computer and communications security, pp. 112-121. ACM Press, New York (1998)
-
-
-
-
35
-
-
0034823388
-
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
-
Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Pfitzmann, B., Waidner, M.: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In: SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 184-200. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
|