-
1
-
-
85083027758
-
-
Abadi, M., R.ogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
-
Abadi, M., R.ogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
-
-
-
-
2
-
-
28144460109
-
Computational and information-theoretic soundness and completeness of formal encryption
-
Adão, P., Bana, G., Seedrov, A.: Computational and information-theoretic soundness and completeness of formal encryption. In: Proc. of the 18th IEEE Computer Security Foudnations Workshop, pp. 170-184 (2005)
-
(2005)
Proc. of the 18th IEEE Computer Security Foudnations Workshop
, pp. 170-184
-
-
Adão, P.1
Bana, G.2
Seedrov, A.3
-
3
-
-
3142632089
-
Just Fast Keying: Key agreement in a hostile internet
-
Aiello, W., Bellovin, S.M., Blaze, M., Canetti, R., Ioannidis, J., Keromytis, A.D., Reingold, O.: Just Fast Keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Security 7(4), 1-30 (2004)
-
(2004)
ACM Trans. Inf. Syst. Security
, vol.7
, Issue.4
, pp. 1-30
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
4
-
-
34548737451
-
Cryptographieally sound security proofs for basic and public-key Kerberos
-
to appear
-
Backes, M., Cervesato, I., Jaggard, A.D., Seedrov, A., Tsay, J.-K.: Cryptographieally sound security proofs for basic and public-key Kerberos. In: Proceedings of 11th European Symposium on Research in Computer Security (to appear, 2006)
-
(2006)
Proceedings of 11th European Symposium on Research in Computer Security
-
-
Backes, M.1
Cervesato, I.2
Jaggard, A.D.3
Seedrov, A.4
Tsay, J.-K.5
-
6
-
-
27544482135
-
Relating symbolic and cryptographic secrecy
-
IEEE Computer Society Press, Los Alamitos
-
Backes, M., Pfitzmann, B.: Relating symbolic and cryptographic secrecy. In: Proc. IEEE Symposium on Security and Privacy, pp. 171-182. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proc. IEEE Symposium on Security and Privacy
, pp. 171-182
-
-
Backes, M.1
Pfitzmann, B.2
-
7
-
-
32844458560
-
A universally composable cryptographic library. Cryptology ePrint Archive
-
Report 2003/015
-
Backes, M., Pfitzmann, B., Waidner, M.: A universally composable cryptographic library. Cryptology ePrint Archive, Report 2003/015 (2003)
-
(2003)
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
8
-
-
33750265393
-
Limits of the reactive simulatability/UC of Dolev-Yao models with hashes
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Backes, M., Pfitzmann, B., Waidner, M.: Limits of the reactive simulatability/UC of Dolev-Yao models with hashes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 404-423. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 404-423
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
9
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
Quisquater, J.-J, Deswarte, Y, Meadows, C, Gollmann, D, eds, ESORICS 1998, Springer, Heidelberg
-
Bella, G., Paulson, L.C.: Kerberos version IV: Inductive analysis of the secrecy goals. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 361-375. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
10
-
-
84948957152
-
Public-key encryption in a multi-user setting: Security proofs and improvements
-
Preneel. B, ed, EUROCRYPT 2000, Springer. Heidelberg
-
Bellare, M., Boldyreva, A. Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel. B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259-274. Springer. Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
11
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
13
-
-
84945119254
-
Entity authentication and key distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
14
-
-
34548797158
-
Provable-security analysis of authenticated encryption in Kerberos
-
Boldyreva, A., Kumar, V.: Provable-security analysis of authenticated encryption in Kerberos. In: Proc. IEEE Security and Privacy (2007)
-
(2007)
Proc. IEEE Security and Privacy
-
-
Boldyreva, A.1
Kumar, V.2
-
15
-
-
38049082991
-
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Bresson, E., Lakhnech, Y., Mazare, L., Warinschi, B.: A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
-
-
Bresson, E.1
Lakhnech, Y.2
Mazare, L.3
Warinschi, B.4
-
16
-
-
41549092984
-
-
ISSS
-
Butler, F., Cervesato, I., Jaggard, A.D., Seedrov, A.: Verifying confidentiality and authentication in Kerberos. In: ISSS, vol. 5. pp. 1-24 (2003)
-
(2003)
Verifying confidentiality and authentication in Kerberos
, vol.5
, pp. 1-24
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.D.3
Seedrov, A.4
-
17
-
-
84880897758
-
Universally composable commitments
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
18
-
-
33745528593
-
-
Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS. 3876. pp. 380-403. Springer, Heidelberg (2006)
-
Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS. vol. 3876. pp. 380-403. Springer, Heidelberg (2006)
-
-
-
-
19
-
-
49949119291
-
-
Cervesato, I., Jaggard, A., Seedrov, A., Tsay, J.-K., Walstad, C.: Breaking and fixing public-key Kerberos. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, 4435, pp. 167-181. Springer, Heidelberg (2008)
-
Cervesato, I., Jaggard, A., Seedrov, A., Tsay, J.-K., Walstad, C.: Breaking and fixing public-key Kerberos. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 167-181. Springer, Heidelberg (2008)
-
-
-
-
20
-
-
28144435566
-
-
Cervesato, L. Meadows, C. Pavlovic, D.: An encapsulated authentication logic for reasoning about key distribution protocols. In: CSFW, pp. 48-61 (2005)
-
Cervesato, L. Meadows, C. Pavlovic, D.: An encapsulated authentication logic for reasoning about key distribution protocols. In: CSFW, pp. 48-61 (2005)
-
-
-
-
21
-
-
33746351314
-
Key derivation and randomness extraction. Cryptology ePrint Archive
-
Report 2005/061
-
Chevassut, O., Fouque, P.-A., Gaudry, P., Pointcheval, D.: Key derivation and randomness extraction. Cryptology ePrint Archive, Report 2005/061 (2005). http://eprint.iacr.org/
-
(2005)
-
-
Chevassut, O.1
Fouque, P.-A.2
Gaudry, P.3
Pointcheval, D.4
-
22
-
-
24644437051
-
-
Cortier, V., Warinschi, B.: Computationally sound, automated proofs for security protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 157-171. Springer, Heidelberg (2005)
-
Cortier, V., Warinschi, B.: Computationally sound, automated proofs for security protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 157-171. Springer, Heidelberg (2005)
-
-
-
-
23
-
-
33745534937
-
-
Datta, A., Derek, A., Mitchell, J., Ramanathan, A., Seedrov, A.: Games and the impossibility of realizable ideal functionality. In: TCC, pp. 360-379 (2006)
-
Datta, A., Derek, A., Mitchell, J., Ramanathan, A., Seedrov, A.: Games and the impossibility of realizable ideal functionality. In: TCC, pp. 360-379 (2006)
-
-
-
-
24
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. Journal of Computer Security 13, 423-482 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
25
-
-
33847655213
-
Protocol Composition Logic (PCL)
-
Datta, A., Derek, A., Mitchell, J.C., Roy, A.: Protocol Composition Logic (PCL). Electronic Notes in Theoretical Computer Science 172. 311-358 (2007)
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.172
, pp. 311-358
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Roy, A.4
-
26
-
-
26444565771
-
Probabilistic polynomial-time semantics for a protocol security logic
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Datta, A., Derek, A., Mitchell, J.C., Shmatikov, V., Turuani, M.: Probabilistic polynomial-time semantics for a protocol security logic. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 16-29. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 16-29
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Shmatikov, V.4
Turuani, M.5
-
27
-
-
33947704230
-
Computationally sound compositional logic for key exchange protocols
-
IEEE Computer Society Press, Los Alamitos
-
Datta, A., Derek, A., Mitchell, J.C., Warinschi, B.: Computationally sound compositional logic for key exchange protocols. In: Proceedings of 19th IEEE Computer Security Foundations Workshop, pp. 321-334. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
Proceedings of 19th IEEE Computer Security Foundations Workshop
, pp. 321-334
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Warinschi, B.4
-
29
-
-
33745770376
-
A modular correctness proof of IEEE 802.11i and TLS
-
He, C., Sundararajan, M., Datta, A., Derek, A., Mitchell, J.C.: A modular correctness proof of IEEE 802.11i and TLS. In: ACM Conference on Computer and Communications Security, pp. 2-15 (2005)
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 2-15
-
-
He, C.1
Sundararajan, M.2
Datta, A.3
Derek, A.4
Mitchell, J.C.5
-
30
-
-
12144271120
-
The Diffie-Hellman key-agreement scheme in the strand-space model
-
IEEE Computer Society Press, Los Alamitos
-
Herzog, J.: The Diffie-Hellman key-agreement scheme in the strand-space model. In: Proceedings of 16th IEEE Computer Security Foundations Workshop, pp. 234-247. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proceedings of 16th IEEE Computer Security Foundations Workshop
, pp. 234-247
-
-
Herzog, J.1
-
32
-
-
24644476184
-
-
Janvier, R., Mazare. L., Lakhnech. Y.: Completing the picture: Soundness of formal encryption in the presence of active adversaries. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 172-185. Springer, Heidelberg (2005)
-
Janvier, R., Mazare. L., Lakhnech. Y.: Completing the picture: Soundness of formal encryption in the presence of active adversaries. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 172-185. Springer, Heidelberg (2005)
-
-
-
-
33
-
-
84974720881
-
-
Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Schneier. B. (ed.) FSE 2000. LNCS, 1978, pp. 284-299. Springer, Heidelberg (2001)
-
Katz, J., Yung, M.: Unforgeable encryption and chosen ciphertext secure modes of operation. In: Schneier. B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 284-299. Springer, Heidelberg (2001)
-
-
-
-
36
-
-
77957106539
-
Computationally sound verifiation of security protocols using Diffie-Hellman exponentiation. Cryptology ePrint Archive
-
Report 2005/097
-
Lakhnech, Y., Mazaré. L.: Computationally sound verifiation of security protocols using Diffie-Hellman exponentiation. Cryptology ePrint Archive: Report 2005/097 (2005)
-
(2005)
-
-
Lakhnech, Y.1
Mazaré, L.2
-
37
-
-
0344875571
-
-
Micciancio, D., Warinschi, B.: Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security 12(1), 99-129 (2004). Preliminary version in WITS 2002
-
Micciancio, D., Warinschi, B.: Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security 12(1), 99-129 (2004). Preliminary version in WITS 2002
-
-
-
-
38
-
-
35048899313
-
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 133-151. Springer, Heidelberg (2004)
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
-
-
-
-
39
-
-
38049030237
-
Inductive proofs of computational secrecy
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Roy, A., Datta, A., Derek, A., Mitchell, J.C.: Inductive proofs of computational secrecy. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS. vol. 4734, pp. 219-234. Springer, Heidelberg (2007), http://www.stanford. edu/arnab/rddm-Induct iveProofs.pdf
-
(2007)
LNCS
, vol.4734
, pp. 219-234
-
-
Roy, A.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
-
40
-
-
41549138983
-
-
Roy, A., Datta, A., Derek, A., Mitchell, J.C.: Inductive trace properties for computational security. In: WITS (2007). http://www.stanford.edu/arnab/ rddm-IndTraceProps.pdf
-
Roy, A., Datta, A., Derek, A., Mitchell, J.C.: Inductive trace properties for computational security. In: WITS (2007). http://www.stanford.edu/arnab/ rddm-IndTraceProps.pdf
-
-
-
-
41
-
-
38049090664
-
Secrecy analysis in Protocol Composition Logic
-
to appear
-
Roy, A., Datta, A., Derek, A., Mitchell, J.C., Seifert, J.-P.: Secrecy analysis in Protocol Composition Logic. In: Proceedings of 11th Annual Asian Computing Science Conference (to appear, 2006)
-
(2006)
Proceedings of 11th Annual Asian Computing Science Conference
-
-
Roy, A.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
Seifert, J.-P.5
-
43
-
-
41549098491
-
-
Zhu, L., Tung, B.: Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC 4556 (Proposed Standard) (June 2006)
-
Zhu, L., Tung, B.: Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC 4556 (Proposed Standard) (June 2006)
-
-
-
|