-
1
-
-
84978977131
-
-
M. Abadi and J. Jürjens, Formal eavesdropping and its computational interpretation, in: Proc. 4th International Symposium on Theoretical Aspects of Computer Software TACS, 2001, pp. 82-94
-
M. Abadi and J. Jürjens, Formal eavesdropping and its computational interpretation, in: Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS), 2001, pp. 82-94.
-
-
-
-
2
-
-
84879078812
-
Reconciling two views of cryptography: The computational soundness of formal encryption
-
Proc. 1st IFIP International Conference on Theoretical Computer Science, Springer
-
M. Abadi and P. Rogaway, Reconciling two views of cryptography: The computational soundness of formal encryption, in: Proc. 1st IFIP International Conference on Theoretical Computer Science, Lecture Notes in Computer Science, Vol. 1872, Springer, 2000, pp. 3-22.
-
(2000)
Lecture Notes in Computer Science
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
33646045378
-
Soundness of formal encryption in the presence of keycycles
-
Proc. 10th European Symposium on Research in Computer Security ESORICS, Springer
-
P. Adão, G. Bana, J. Herzog and A. Scedrov, Soundness of formal encryption in the presence of keycycles, in: Proc. 10th European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science, Vol. 3679, Springer, 2005, pp. 374-396.
-
(2005)
Lecture Notes in Computer Science
, vol.3679
, pp. 374-396
-
-
Adão, P.1
Bana, G.2
Herzog, J.3
Scedrov, A.4
-
6
-
-
1442292329
-
-
M. Backes, B. Pfitzmann and M. Waidner, A composable cryptographic library with nested operations (extended abstract), in: Proc. 10th ACM Conference on Computer and Communications Security, 2003, pp. 220-230. (Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.)
-
M. Backes, B. Pfitzmann and M. Waidner, A composable cryptographic library with nested operations (extended abstract), in: Proc. 10th ACM Conference on Computer and Communications Security, 2003, pp. 220-230. (Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003, http://eprint.iacr.org/.)
-
-
-
-
7
-
-
84855205195
-
The reactive simulatability (RSIM) framework for asynchronous systems
-
M. Backes, B. Pfitzmann and M. Waidner, The reactive simulatability (RSIM) framework for asynchronous systems, Information and Computation 205(12) (2007), 1685-1720.
-
(2007)
Information and Computation
, vol.205
, Issue.12
, pp. 1685-1720
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
8
-
-
33746365751
-
Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority
-
D. Beaver, Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority, Journal of Cryptology 4(2) (1991), 75-122.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
9
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
M. Bellare, A. Desai, E. Jokipii and P. Rogaway, A concrete security treatment of symmetric encryption, in: Proc. 38th IEEE Symposium on Foundations of Computer Science (FOCS), 1997, pp. 394-403.
-
(1997)
Proc. 38th IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
10
-
-
84957629783
-
Relations among notions of security for publickey encryption schemes
-
Advances in Cryptology: CRYPTO '98, Springer
-
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations among notions of security for publickey encryption schemes, in: Advances in Cryptology: CRYPTO '98, Lecture Notes in Computer Science, Vol. 1462, Springer, 1998, pp. 26-45.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
11
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Advances in Cryptology: ASIACRYPT 2000, Springer
-
M. Bellare and C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, in: Advances in Cryptology: ASIACRYPT 2000, Lecture Notes in Computer Science, Vol. 1976, Springer, 2000, pp. 531-545.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
13
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Advances in Cryptology: EUROCRYPT 2001, Springer
-
J. Camenisch and A. Lysyanskaya, An efficient system for non-transferable anonymous credentials with optional anonymity revocation, in: Advances in Cryptology: EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, Springer, 2001, pp. 93-118.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti, Security and composition of multiparty cryptographic protocols, Journal of Cryptology 3(1) (2000), 143-202.
-
(2000)
Journal of Cryptology
, vol.3
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
15
-
-
0035163054
-
-
R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in: Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), 2001, pp. 136-145. (Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.)
-
R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in: Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), 2001, pp. 136-145. (Extended version in Cryptology ePrint Archive, Report 2000/67, http://eprint.iacr.org/.)
-
-
-
-
16
-
-
33745528593
-
Universally composable symbolic analysis of mutual authentication and key exchange protocols
-
Proc. 3rd Theory of Cryptography Conference TCC, Springer
-
R. Canetti and J. Herzog, Universally composable symbolic analysis of mutual authentication and key exchange protocols, in: Proc. 3rd Theory of Cryptography Conference (TCC), Lecture Notes in Computer Science, Vol. 3876, Springer, 2006, pp. 380-403.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 380-403
-
-
Canetti, R.1
Herzog, J.2
-
18
-
-
0343337504
-
Nonmalleable cryptography
-
D. Dolev, C. Dwork and M. Naor, Nonmalleable cryptography, SIAM Journal on Computing 30(2) (2000), 391-437.
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
20
-
-
4243148483
-
Magic functions
-
C. Dwork, M. Naor, O. Reingold and L.J. Stockmeyer, Magic functions, Journal of the ACM 50(6) (2003), 852-921.
-
(2003)
Journal of the ACM
, vol.50
, Issue.6
, pp. 852-921
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Stockmeyer, L.J.4
-
22
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
Advances in Cryptology: CRYPTO '90, Springer
-
S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority, in: Advances in Cryptology: CRYPTO '90, Lecture Notes in Computer Science, Vol. 537, Springer, 1990, pp. 77-93.
-
(1990)
Lecture Notes in Computer Science
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
24
-
-
61749103962
-
-
S. Halevi and H. Krawczyk, Security under key-dependent inputs, in: Proc. of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 466-475. (Preprint on IACR ePrint 2007/315.)
-
S. Halevi and H. Krawczyk, Security under key-dependent inputs, in: Proc. of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 466-475. (Preprint on IACR ePrint 2007/315.)
-
-
-
-
25
-
-
44449114656
-
-
D. Hofheinz and D. Unruh, Towards key-dependent message security in the standard model, in: Proc. of Advances in Cryptology: EUROCRYPT 2008, August 2007, Lecture Notes in Computes Science, 4965, Springer, 2008, pp. 108-126. (Preprint on IACR ePrint 2007/333.)
-
D. Hofheinz and D. Unruh, Towards key-dependent message security in the standard model, in: Proc. of Advances in Cryptology: EUROCRYPT 2008, August 2007, Lecture Notes in Computes Science, Vol. 4965, Springer, 2008, pp. 108-126. (Preprint on IACR ePrint 2007/333.)
-
-
-
-
26
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
P. Laud, Semantics and program analysis of computationally secure information flow, in: Proc. 10th European Symposium on Programming (ESOP), 2001, pp. 77-91.
-
(2001)
Proc. 10th European Symposium on Programming (ESOP)
, pp. 77-91
-
-
Laud, P.1
-
27
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
P. Laud, Symmetric encryption in automatic analyses for confidentiality against active adversaries, in: Proc. 25th IEEE Symposium on Security & Privacy, 2004, pp. 71-85.
-
(2004)
Proc. 25th IEEE Symposium on Security & Privacy
, pp. 71-85
-
-
Laud, P.1
-
29
-
-
0024665570
-
Using narrowing in the analysis of key management protocols
-
C. Meadows, Using narrowing in the analysis of key management protocols, in: Proc. 10th IEEE Symposium on Security & Privacy, 1989, pp. 138-147.
-
(1989)
Proc. 10th IEEE Symposium on Security & Privacy
, pp. 138-147
-
-
Meadows, C.1
-
30
-
-
84974655726
-
Secure computation
-
Advances in Cryptology: CRYPTO '91, Springer
-
S. Micali and P. Rogaway, Secure computation, in: Advances in Cryptology: CRYPTO '91, Lecture Notes in Computer Science, Vol. 576, Springer, 1991, pp. 392-404.
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
31
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Proc. 1st Theory of Cryptography Conference TCC, Springer
-
D. Micciancio and B. Warinschi, Soundness of formal encryption in the presence of active adversaries, in: Proc. 1st Theory of Cryptography Conference (TCC), Lecture Notes in Computer Science, Vol. 2951, Springer, 2004, pp. 133-151.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
32
-
-
0034447081
-
-
B. Pfitzmann and M. Waidner, Composition and integrity preservation of secure reactive systems, in: Proc. 7th ACM Conference on Computer and Communications Security, 2000, pp. 245-254. (Extended version (with Matthias Schunter) IBM Research Report RZ 3206, May 2000, http://www.semper.org/sirene/ publ/PfSW1_00ReactSimulIBM.ps.gz.)
-
B. Pfitzmann and M. Waidner, Composition and integrity preservation of secure reactive systems, in: Proc. 7th ACM Conference on Computer and Communications Security, 2000, pp. 245-254. (Extended version (with Matthias Schunter) IBM Research Report RZ 3206, May 2000, http://www.semper.org/sirene/ publ/PfSW1_00ReactSimulIBM.ps.gz.)
-
-
-
-
33
-
-
0034823388
-
-
B. Pfitzmann and M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission, in: Proc. 22nd IEEE Symposium on Security & Privacy, 2001, pp. 184-200. (Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082, http://eprint.iacr.org/.)
-
B. Pfitzmann and M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission, in: Proc. 22nd IEEE Symposium on Security & Privacy, 2001, pp. 184-200. (Extended version of the model (with Michael Backes) IACR Cryptology ePrint Archive 2004/082, http://eprint.iacr.org/.)
-
-
-
-
34
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Advances in Ciyptology: CRYPTO'91, Springer
-
C. Rackoff and D.R. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, in: Advances in Ciyptology: CRYPTO'91, Lecture Notes in Computer Science, Vol. 576, Springer, 1992, pp. 433-444.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
35
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal 28(4) (1949), 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
|