-
1
-
-
33646045378
-
Soundness of formal encryption in the presence of key-cycles
-
de Capitani di Vimercati, S, Syverson, P.F, Gollmann, D, eds, ESORICS 2005, Springer, Heidelberg
-
Adão, P., Bana, G., Herzog, J., Scedrov, A.: Soundness of formal encryption in the presence of key-cycles. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 374-396. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3679
, pp. 374-396
-
-
Adão, P.1
Bana, G.2
Herzog, J.3
Scedrov, A.4
-
2
-
-
28144460109
-
Computational and information-theoretic soundness and completeness of formal encryption. In: CSFW
-
Los Alamitos
-
Adão, P., Bana, G., Scedrov, A.: Computational and information-theoretic soundness and completeness of formal encryption. In: CSFW 2005, pp. 170-184. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
170-184. IEEE Computer Society Press
, pp. 2005
-
-
Adão, P.1
Bana, G.2
Scedrov, A.3
-
3
-
-
33745790245
-
Guessing attacks and the computational soundness of static equivalence
-
Aceto, L, Ingólfsdóttir, A, eds, FOSSACS 2006 and ETAPS 2006, Springer, Heidelberg
-
Abadi, M., Baudet, M., Warinschi, B.: Guessing attacks and the computational soundness of static equivalence. In: Aceto, L., Ingólfsdóttir, A. (eds.) FOSSACS 2006 and ETAPS 2006. LNCS, vol. 3921, pp. 398-412. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3921
, pp. 398-412
-
-
Abadi, M.1
Baudet, M.2
Warinschi, B.3
-
4
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology 15(2), 103-127 (2002)
-
(2002)
J. Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
6
-
-
26444541858
-
Computationally sound implementations of equational theories against passive adversaries
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Baudet, M., Cortier, V., Kremer, S.: Computationally sound implementations of equational theories against passive adversaries. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 652-663. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 652-663
-
-
Baudet, M.1
Cortier, V.2
Kremer, S.3
-
7
-
-
38049082991
-
A generalization of DDH with applications to protocol analysis and computational soundness
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Bresson, E., Lakhnech, Y., Mazaré, L., Warinschi, B.: A generalization of DDH with applications to protocol analysis and computational soundness. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
-
-
Bresson, E.1
Lakhnech, Y.2
Mazaré, L.3
Warinschi, B.4
-
8
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
0031642212
-
-
STOC, ACM Press, New York 1998
-
Di Crescenzo, G., Ishai, Y., Ostrovsky, R.: Non-interactive and non-malleable commitment. In: STOC 1998, pp. 141-150. ACM Press, New York (1998)
-
(1998)
Non-interactive and non-malleable commitment
, pp. 141-150
-
-
Di Crescenzo, G.1
Ishai, Y.2
Ostrovsky, R.3
-
10
-
-
84962447835
-
Computationally sound symbolic secrecy in the presence of hash functions
-
Arun-Kumar, S, Garg, N, eds, FSTTCS 2006, Springer, Heidelberg
-
Cortier, V., Kremer, S., Küsters, R., Warinschi, B.: Computationally sound symbolic secrecy in the presence of hash functions. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 176-187. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4337
, pp. 176-187
-
-
Cortier, V.1
Kremer, S.2
Küsters, R.3
Warinschi, B.4
-
11
-
-
84945133720
-
Efficient and non-interactive non-malleable commitment
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Di Crescenzo, G., Katz, J., Ostrovsky, R., Smith, A.: Efficient and non-interactive non-malleable commitment. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 40-59. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 40-59
-
-
Di Crescenzo, G.1
Katz, J.2
Ostrovsky, R.3
Smith, A.4
-
12
-
-
85028450627
-
-
STOC, ACM Press, New York 1991
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: STOC 1991, pp. 542-552. ACM Press, New York (1991)
-
(1991)
Non-malleable cryptography
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
13
-
-
0022080529
-
A randomizing protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomizing protocol for signing contracts. Comm. ACM 28(6), 637-647 (1985)
-
(1985)
Comm. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
14
-
-
84983134965
-
Efficient non-malleable commitment schemes
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Fischlin, M., Fischlin, R.: Efficient non-malleable commitment schemes. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 413-431. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 413-431
-
-
Fischlin, M.1
Fischlin, R.2
-
16
-
-
71149116146
-
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. J. ACM 38(1), 691-729 (1991)
-
(1991)
J. ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
33845272534
-
-
Garcia, F.D., van Rossum, P.: Sound computational interpretation of symbolic hashes in the standard model. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, 4266, pp. 33-47. Springer, Heidelberg (2006)
-
Garcia, F.D., van Rossum, P.: Sound computational interpretation of symbolic hashes in the standard model. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 33-47. Springer, Heidelberg (2006)
-
-
-
-
18
-
-
18544364489
-
A computational interpretation of Dolev-Yao adversaries
-
Herzog, J.: A computational interpretation of Dolev-Yao adversaries. Theoretical Computer Science 340(1), 57-81 (2005)
-
(2005)
Theoretical Computer Science
, vol.340
, Issue.1
, pp. 57-81
-
-
Herzog, J.1
-
19
-
-
24644476184
-
-
Janvier, R., Lakhnech, Y., Mazar, L.: Completing the picture: Soundness of formal encryption in the presence of active adversaries. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 172-185. Springer, Heidelberg (2005)
-
Janvier, R., Lakhnech, Y., Mazar, L.: Completing the picture: Soundness of formal encryption in the presence of active adversaries. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 172-185. Springer, Heidelberg (2005)
-
-
-
-
20
-
-
38049000874
-
Adaptive soundness of static equivalence
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Kremer, S., Mazaré, L.: Adaptive soundness of static equivalence. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
-
-
Kremer, S.1
Mazaré, L.2
-
21
-
-
41549095024
-
-
Mazaré, L.: Computationally sound analysis of protocols using bilinear pairings. In: WITS 2007, pp. 6-21 (2007)
-
Mazaré, L.: Computationally sound analysis of protocols using bilinear pairings. In: WITS 2007, pp. 6-21 (2007)
-
-
-
-
22
-
-
24144482305
-
-
Micciancio, D., Panjwani, S.: Adaptive security of symbolic encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 169-187. Springer, Heidelberg (2005)
-
Micciancio, D., Panjwani, S.: Adaptive security of symbolic encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 169-187. Springer, Heidelberg (2005)
-
-
-
-
23
-
-
35048899313
-
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 133-151. Springer, Heidelberg (2004)
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
-
-
-
-
24
-
-
0024983231
-
-
STOC, ACM Press, New York 1990
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attack. In: STOC 1990, pp. 427-437. ACM Press, New York (1990)
-
(1990)
Public-key cryptosystems provably secure against chosen ciphertext attack
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
25
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
26
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs. Cryptology ePrint Archive
-
Report 2004/332
-
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004), http://eprint.iacr. org/
-
(2004)
-
-
Shoup, V.1
|