메뉴 건너뛰기




Volumn 17, Issue , 2004, Pages 204-218

Symmetric encryption in a simulatable Dolev-Yao style cryptographic library

Author keywords

[No Author keywords available]

Indexed keywords

CANCELLATION RULES; CRYPTOGRAPHIC LIBRARY; NESTED TERMS; SYMMETRIC ENCRYPTION;

EID: 4944234643     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (82)

References (33)
  • 2
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography: The computational soundness of formal encryption
    • Volume 1872 of LNCS. Springer
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography: The computational soundness of formal encryption. In Proc. 1st IFIP International Conference on Theoretical Computer Science, volume 1872 of LNCS, pages 3-22. Springer, 2000.
    • (2000) Proc. 1st IFIP International Conference on Theoretical Computer Science , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 19744369525 scopus 로고    scopus 로고
    • Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
    • Feb.
    • M. Backes and B. Pfitzmann. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. IACR Cryptology ePrint Archive 2004/059, Feb. 2004.
    • (2004) IACR Cryptology EPrint Archive , vol.2004 , Issue.59
    • Backes, M.1    Pfitzmann, B.2
  • 5
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations (extended abstract)
    • Full version in IACR Cryptology ePrint Archive
    • M. Backes, B. Pfitzmann, and M. Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003.Full version in IACR Cryptology ePrint Archive 2003/015.
    • (2003) Proc. 10th ACM Conference on Computer and Communications Security , vol.2003 , Issue.15 , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 9
    • 84958599141 scopus 로고    scopus 로고
    • Plug and play encryption
    • Volume 1294 of LNCS. Springer
    • D. Beaver. Plug and play encryption. In Proc. CRYPTO '97, volume 1294 of LNCS, pages 75-89. Springer, 1997.
    • (1997) Proc. CRYPTO '97 , pp. 75-89
    • Beaver, D.1
  • 10
    • 85048601848 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • Volume 658 of LNCS. Springer
    • D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic adversaries. In Proc. EUROCRYPT '92, volume 658 of LNCS, pages 307-323. Springer, 1992.
    • (1992) Proc. EUROCRYPT '92 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 11
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Volume 1976 of LNCS. Springer
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Proc. ASIACRYPT 2000, volume 1976 of LNCS, pages 531-545. Springer, 2000.
    • (2000) Proc. ASIACRYPT 2000 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 13
    • 84937429718 scopus 로고    scopus 로고
    • Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient constructions
    • Volume 1976 of LNCS. Springer
    • M. Bellare and P. Rogaway. Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient constructions. In Proc. ASIACRYPT 2000, volume 1976 of LNCS, pages 317-330. Springer, 2000.
    • (2000) Proc. ASIACRYPT 2000 , pp. 317-330
    • Bellare, M.1    Rogaway, P.2
  • 18
    • 84974602942 scopus 로고    scopus 로고
    • Improved non-committing encryption schemes based on a general complexity assumption
    • Volume 1880 of LNCS. Springer
    • I. Damgård and J. B. Neilsen. Improved non-committing encryption schemes based on a general complexity assumption. In Proc. CRYPTO 2000, volume 1880 of LNCS, pages 432-450. Springer, 2000.
    • (2000) Proc. CRYPTO 2000 , pp. 432-450
    • Damgård, I.1    Neilsen, J.B.2
  • 21
    • 35248848005 scopus 로고    scopus 로고
    • Plaintext awareness via key registration
    • Volume 2729 of LNCS. Springer
    • J. Herzog, M. Liskov, and S. Micali. Plaintext awareness via key registration. In Proc. CRYPTO 2003, volume 2729 of LNCS, pages 548-564. Springer, 2003.
    • (2003) Proc. CRYPTO 2003 , pp. 548-564
    • Herzog, J.1    Liskov, M.2    Micali, S.3
  • 24
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming, pages 77-91, 2001.
    • (2001) Proc. 10th European Symposium on Programming , pp. 77-91
    • Laud, P.1
  • 26
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Volume 2951 of LNCS. Springer
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference, volume 2951 of LNCS, pages 133-151. Springer, 2004.
    • (2004) Proc. 1st Theory of Cryptography Conference , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 27
    • 0037611038 scopus 로고    scopus 로고
    • On the freedom of decryption
    • June
    • J. Millen. On the freedom of decryption. Information Processing Letters, 86(6):329-333, June 2003.
    • (2003) Information Processing Letters , vol.86 , Issue.6 , pp. 329-333
    • Millen, J.1
  • 29
    • 0345280512 scopus 로고    scopus 로고
    • A probabilistic polynominal-tune process calculus for analysis of cryptographic protocols (preliminary report)
    • J. Mitchell, M. Mitchell, A. Scedrov, and V. Teague. A probabilistic polynominal-tune process calculus for analysis of cryptographic protocols (preliminary report). Electronic Notes in Theoretical Computer Science, 47:1-31, 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.47 , pp. 1-31
    • Mitchell, J.1    Mitchell, M.2    Scedrov, A.3    Teague, V.4
  • 30
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its application to secure message transmission
    • B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001.
    • (2001) Proc. 22nd IEEE Symposium on Security & Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.