메뉴 건너뛰기




Volumn 207, Issue 4, 2009, Pages 496-520

Computationally sound implementations of equational theories against passive adversaries

Author keywords

[No Author keywords available]

Indexed keywords

BIOMINERALIZATION; SECURITY OF DATA;

EID: 60549089343     PISSN: 08905401     EISSN: 10902651     Source Type: Journal    
DOI: 10.1016/j.ic.2008.12.005     Document Type: Article
Times cited : (14)

References (40)
  • 1
    • 26444541858 scopus 로고    scopus 로고
    • Computationally sound implementations of equational theories against passive adversaries
    • Proceedings of 32nd International Colloquium on Automata, Languages and Programming ICALP'05, Springer
    • M. Baudet, V. Cortier, S. Kremer, Computationally sound implementations of equational theories against passive adversaries, in: Proceedings of 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), LNCS, vol. 3580, Springer, 2005, pp. 652-663.
    • (2005) LNCS , vol.3580 , pp. 652-663
    • Baudet, M.1    Cortier, V.2    Kremer, S.3
  • 4
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Proceedings 1st IFIP International Conference on Theoretical Computer Science IFIP-TCS'00
    • M. Abadi, P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption), in: Proceedings 1st IFIP International Conference on Theoretical Computer Science (IFIP-TCS'00), LNCS, vol. 1872, 2000, pp. 3-22.
    • (2000) LNCS , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 5
    • 60549096782 scopus 로고    scopus 로고
    • H. Comon, V. Shmatikov, Is it possible to decide whether a cryptographic protocol is secure or not? Journal of Telecommunications and Information Technology 4 (2002) 5-15.
    • H. Comon, V. Shmatikov, Is it possible to decide whether a cryptographic protocol is secure or not? Journal of Telecommunications and Information Technology 4 (2002) 5-15.
  • 6
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • Cortier V., Delaune S., and Lafourcade P. A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14 1 (2006) 1-43
    • (2006) Journal of Computer Security , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 10
    • 35048822401 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Proceedings of 31st International Colloquium on Automata, Languages and Programming ICALP'04
    • M. Abadi, V. Cortier, Deciding knowledge in security protocols under equational theories, in: Proceedings of 31st International Colloquium on Automata, Languages and Programming (ICALP'04), LNCS, vol. 3142, 2004, pp. 46-58.
    • (2004) LNCS , vol.3142 , pp. 46-58
    • Abadi, M.1    Cortier, V.2
  • 13
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
    • Micciancio D., and Warinschi B. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security 12 1 (2004) 99-129
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-129
    • Micciancio, D.1    Warinschi, B.2
  • 15
    • 35048855625 scopus 로고    scopus 로고
    • Sound computational interpretation of formal encryption with composed keys
    • Proceedings of 6th International Conference on Information Security and Cryptology ICISC'03
    • P. Laud, R. Corin, Sound computational interpretation of formal encryption with composed keys, in: Proceedings of 6th International Conference on Information Security and Cryptology (ICISC'03), LNCS, vol. 2971, 2004, pp. 55-66.
    • (2004) LNCS , vol.2971 , pp. 55-66
    • Laud, P.1    Corin, R.2
  • 16
    • 33646045378 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of key-cycles
    • Proceedings of 10th European Symposium on Research in Computer Security ESORICS'05
    • P. Adão, J. Herzog, G. Bana, A. Scedrov, Soundness of formal encryption in the presence of key-cycles, in: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS'05), LNCS, vol. 3679, 2005, pp. 374-396.
    • (2005) LNCS , vol.3679 , pp. 374-396
    • Adão, P.1    Herzog, J.2    Bana, G.3    Scedrov, A.4
  • 19
    • 0142250274 scopus 로고    scopus 로고
    • Symmetric authentication within simulatable cryptographic library
    • Proceedings of 8th European Symposium on Research in Computer Security ESORICS'03
    • M. Backes, B. Pfitzmann, M. Waidner, Symmetric authentication within simulatable cryptographic library, in: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS'03), LNCS, 2003, pp. 271-290.
    • (2003) LNCS , pp. 271-290
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 20
    • 24644437051 scopus 로고    scopus 로고
    • Computationally sound, automated proofs for security protocols
    • Proceedings of 14th European Symposium on Programming ESOP'05
    • V. Cortier, B. Warinschi, Computationally sound, automated proofs for security protocols, in: Proceedings of 14th European Symposium on Programming (ESOP'05), LNCS, vol. 3444, 2005, pp. 157-171.
    • (2005) LNCS , vol.3444 , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 21
    • 24644476184 scopus 로고    scopus 로고
    • Completing the picture: Soundness of formal encryption in the presence of active adversaries
    • Proceedings of 14th European Symposium on Programming ESOP'05
    • R. Janvier, Y. Lakhnech, L. Mazaré, Completing the picture: soundness of formal encryption in the presence of active adversaries, in: Proceedings of 14th European Symposium on Programming (ESOP'05), LNCS, vol. 3444, 2005, pp. 172-185.
    • (2005) LNCS , vol.3444 , pp. 172-185
    • Janvier, R.1    Lakhnech, Y.2    Mazaré, L.3
  • 22
    • 33745528593 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of mutual authentication and key-exchange protocols (extended abstract)
    • Proceedings of 3rd Theory of Cryptography Conference TCC'06
    • R. Canetti, J. Herzog, Universally composable symbolic analysis of mutual authentication and key-exchange protocols (extended abstract), in: Proceedings of 3rd Theory of Cryptography Conference (TCC'06), LNCS, vol. 3876, 2006, pp. 380-403.
    • (2006) LNCS , vol.3876 , pp. 380-403
    • Canetti, R.1    Herzog, J.2
  • 23
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud, Symmetric encryption in automatic analyses for confidentiality against active adversaries, in: Proceedings of IEEE Symposium on Security and Privacy (SSP'04), 2004, pp. 71-85.
    • (2004) Proceedings of IEEE Symposium on Security and Privacy (SSP'04) , pp. 71-85
    • Laud, P.1
  • 24
    • 26444565771 scopus 로고    scopus 로고
    • Probabilistic polynomial-time semantics for a protocol security logic
    • Proceedings of 32nd International Colloquium on Automata, Languages and Programming, ICALP, Lisboa, Portugal, Springer
    • A. Datta, A. Derek, J.C. Mitchell, V. Shmatikov, M. Turuani, Probabilistic polynomial-time semantics for a protocol security logic, in: Proceedings of 32nd International Colloquium on Automata, Languages and Programming, ICALP, Lisboa, Portugal, LNCS, vol. 3580, Springer, 2005, pp. 16-29.
    • (2005) LNCS , vol.3580 , pp. 16-29
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Shmatikov, V.4    Turuani, M.5
  • 25
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • IEEE Computer Society Press
    • Blanchet B. A computationally sound mechanized prover for security protocols. IEEE Symposium on Security and Privacy (2006), IEEE Computer Society Press 140-154
    • (2006) IEEE Symposium on Security and Privacy , pp. 140-154
    • Blanchet, B.1
  • 26
    • 33646036428 scopus 로고    scopus 로고
    • Limits of the cryptographic realization of dolev-yao-style xor
    • Proceedings of 10th European Symposium on Research in Computer Security ESORICS'05
    • M. Backes, B. Pfitzmann, Limits of the cryptographic realization of dolev-yao-style xor, in: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS'05), LNCS, vol. 3679, 2005, pp. 336-354.
    • (2005) LNCS , vol.3679 , pp. 336-354
    • Backes, M.1    Pfitzmann, B.2
  • 27
    • 26444502046 scopus 로고    scopus 로고
    • Password-based encryption analyzed
    • Proceedings of 32nd International Colloquium on Automata, Languages and Programming ICALP'05
    • M. Abadi, B. Warinschi, Password-based encryption analyzed, in: Proceedings of 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), LNCS, vol. 3580, 2005, pp. 664-676.
    • (2005) LNCS , vol.3580 , pp. 664-676
    • Abadi, M.1    Warinschi, B.2
  • 28
    • 33745790245 scopus 로고    scopus 로고
    • Guessing attacks and the computational soundness of static equivalence
    • Proceedings of 9th International Conference on Foundations of Software Science and Computation Structures FoSSaCS'06
    • M. Abadi, M. Baudet, B. Warinschi, Guessing attacks and the computational soundness of static equivalence, in: Proceedings of 9th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'06), LNCS, vol. 3921, 2006, pp. 398-412.
    • (2006) LNCS , vol.3921 , pp. 398-412
    • Abadi, M.1    Baudet, M.2    Warinschi, B.3
  • 29
    • 49949119889 scopus 로고    scopus 로고
    • The computational soundness of formal indistinguishability and static equivalence
    • Proceedings of 11th Asian Computing Science Conference ASIAN'06, Springer
    • G. Bana, P. Mohassel, T. Stegers, The computational soundness of formal indistinguishability and static equivalence, in: Proceedings of 11th Asian Computing Science Conference (ASIAN'06), LNCS, vol. 4435, Springer, 2006, pp. 182-196.
    • (2006) LNCS , vol.4435 , pp. 182-196
    • Bana, G.1    Mohassel, P.2    Stegers, T.3
  • 30
    • 38049000874 scopus 로고    scopus 로고
    • Adaptive soundness of static equivalence
    • Proceedings of 12th European Symposium on Research in Computer Security ESORICS'07, Springer
    • S. Kremer, L. Mazaré, Adaptive soundness of static equivalence, in: Proceedings of 12th European Symposium on Research in Computer Security (ESORICS'07), LNCS, vol. 4734, Springer, 2007, pp. 610-625.
    • (2007) LNCS , vol.4734 , pp. 610-625
    • Kremer, S.1    Mazaré, L.2
  • 34
    • 35048877679 scopus 로고    scopus 로고
    • On the notion of pseudo-free groups
    • Proceedings of 1st Theory of Cryptography Conference TCC'04
    • R.L. Rivest, On the notion of pseudo-free groups, in: Proceedings of 1st Theory of Cryptography Conference (TCC'04), LNCS, vol. 2951, 2004, pp. 505-521.
    • (2004) LNCS , vol.2951 , pp. 505-521
    • Rivest, R.L.1
  • 36
    • 24944587257 scopus 로고    scopus 로고
    • The RSA group is pseudo-free
    • Advances in Cryptology-Proceedings of EUROCRYPT'05
    • D. Micciancio, The RSA group is pseudo-free, in: Advances in Cryptology-Proceedings of EUROCRYPT'05, LNCS, vol. 3494, 2005, pp. 387-403.
    • (2005) LNCS , vol.3494 , pp. 387-403
    • Micciancio, D.1
  • 37
    • 26444517444 scopus 로고    scopus 로고
    • About the security of ciphers (semantic security and pseudo-random permutations)
    • Proceedings of Selected Areas in Cryptography SAC'04
    • D.H. Phan, D. Pointcheval, About the security of ciphers (semantic security and pseudo-random permutations), in: Proceedings of Selected Areas in Cryptography (SAC'04), LNCS, vol. 3357, 2004, pp. 185-200.
    • (2004) LNCS , vol.3357 , pp. 185-200
    • Phan, D.H.1    Pointcheval, D.2
  • 38
    • 38049131758 scopus 로고    scopus 로고
    • Invertible universal hashing and the TET encryption mode
    • Advances in Cryptology-Proceedings of CRYPTO
    • S. Halevi, Invertible universal hashing and the TET encryption mode, in: Advances in Cryptology-Proceedings of CRYPTO'2007, LNCS, vol. 4622, 2007, pp. 412-429.
    • (2007) LNCS , vol.4622 , pp. 412-429
    • Halevi, S.1
  • 39
    • 84957665479 scopus 로고    scopus 로고
    • On the construction of variable-input-length ciphers
    • Proceedings of 6th Workshop on Fast Software Encryption FSE'99
    • M. Bellare, P. Rogaway, On the construction of variable-input-length ciphers, in: Proceedings of 6th Workshop on Fast Software Encryption (FSE'99), LNCS, vol. 1636, 1999, pp. 231-244.
    • (1999) LNCS , vol.1636 , pp. 231-244
    • Bellare, M.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.