-
2
-
-
84879078812
-
Reconciling two views of cryptography: The computational soundness of formal encryption
-
Volume 1872 of LNCS. Springer
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP International Conference on Theoretical Computer Science, volume 1872 of LNCS, pages 3-22. Springer, 2000.
-
(2000)
Proc. 1st IFIP International Conference on Theoretical Computer Science
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
19744369525
-
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
-
Feb.
-
M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. IACR Cryptology ePrint Archive 2004/059, Feb. 2004.
-
(2004)
IACR Cryptology EPrint Archive
, vol.2004
, Issue.59
-
-
Backes, M.1
Pfitzmann, B.2
-
5
-
-
1442292329
-
A composable cryptographic library with nested operations (extended abstract)
-
Full version in IACR Cryptology ePrint Archive
-
M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003.Full version in IACR Cryptology ePrint Archive 2003/015.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security
, vol.2003
, Issue.15
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
9
-
-
84958599141
-
Plug and play encryption
-
Volume 1294 of LNCS. Springer
-
D. Beaver. Plug and play encryption. In Proc. CRYPTO '97, volume 1294 of LNCS, pages 75-89. Springer, 1997.
-
(1997)
Proc. CRYPTO '97
, pp. 75-89
-
-
Beaver, D.1
-
10
-
-
85048601848
-
Cryptographic protocols provably secure against dynamic adversaries
-
Volume 658 of LNCS. Springer
-
D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic adversaries. In Proc. EUROCRYPT '92, volume 658 of LNCS, pages 307-323. Springer, 1992.
-
(1992)
Proc. EUROCRYPT '92
, pp. 307-323
-
-
Beaver, D.1
Haber, S.2
-
11
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Volume 1976 of LNCS. Springer
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Proc. ASIACRYPT 2000, volume 1976 of LNCS, pages 531-545. Springer, 2000.
-
(2000)
Proc. ASIACRYPT 2000
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
13
-
-
84937429718
-
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient constructions
-
Volume 1976 of LNCS. Springer
-
M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient constructions. In Proc. ASIACRYPT 2000, volume 1976 of LNCS, pages 317-330. Springer, 2000.
-
(2000)
Proc. ASIACRYPT 2000
, pp. 317-330
-
-
Bellare, M.1
Rogaway, P.2
-
15
-
-
0029723583
-
Adaptively secure multi-party computation
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively secure multi-party computation. In Proc. 28th Annual ACM Symposium on Theory of Computing, pages 639-648, 1996.
-
(1996)
Proc. 28th Annual ACM Symposium on Theory of Computing
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
16
-
-
0031619016
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In Proc. 30th Annual ACM Symposium on Theory of Computing, pages 209-218, 1998.
-
(1998)
Proc. 30th Annual ACM Symposium on Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
18
-
-
84974602942
-
Improved non-committing encryption schemes based on a general complexity assumption
-
Volume 1880 of LNCS. Springer
-
I. Damgård and J. B. Neilsen. Improved non-committing encryption schemes based on a general complexity assumption. In Proc. CRYPTO 2000, volume 1880 of LNCS, pages 432-450. Springer, 2000.
-
(2000)
Proc. CRYPTO 2000
, pp. 432-450
-
-
Damgård, I.1
Neilsen, J.B.2
-
21
-
-
35248848005
-
Plaintext awareness via key registration
-
Volume 2729 of LNCS. Springer
-
J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In Proc. CRYPTO 2003, volume 2729 of LNCS, pages 548-564. Springer, 2003.
-
(2003)
Proc. CRYPTO 2003
, pp. 548-564
-
-
Herzog, J.1
Liskov, M.2
Micali, S.3
-
24
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming, pages 77-91, 2001.
-
(2001)
Proc. 10th European Symposium on Programming
, pp. 77-91
-
-
Laud, P.1
-
25
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Proc. 5th ACM Conference on Computer and Communications Security, pages 112-121, 1998.
-
(1998)
Proc. 5th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
26
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Volume 2951 of LNCS. Springer
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference, volume 2951 of LNCS, pages 133-151. Springer, 2004.
-
(2004)
Proc. 1st Theory of Cryptography Conference
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
27
-
-
0037611038
-
On the freedom of decryption
-
June
-
J. Millen. On the freedom of decryption. Information Processing Letters, 86(6):329-333, June 2003.
-
(2003)
Information Processing Letters
, vol.86
, Issue.6
, pp. 329-333
-
-
Millen, J.1
-
29
-
-
0345280512
-
A probabilistic polynominal-tune process calculus for analysis of cryptographic protocols (preliminary report)
-
J. Mitchell, M. Mitchell, A. Scedrov, and V. Teague. A probabilistic polynominal-tune process calculus for analysis of cryptographic protocols (preliminary report). Electronic Notes in Theoretical Computer Science, 47:1-31, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.47
, pp. 1-31
-
-
Mitchell, J.1
Mitchell, M.2
Scedrov, A.3
Teague, V.4
-
30
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001.
-
(2001)
Proc. 22nd IEEE Symposium on Security & Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
31
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB: A block-cipher mode of operation for efficient authenticated encryption. In Proc. 8th ACM Conference on Computer and Communications Security, pages 196-205, 2001.
-
(2001)
Proc. 8th ACM Conference on Computer and Communications Security
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
|