-
1
-
-
33745790245
-
Guessing attacks and the computational soundness of static equivalence
-
Foundations of Software Science and Computation Structure FoSSaCS'06, of
-
M. Abadi, M. Baudet, and B. Warinschi. Guessing attacks and the computational soundness of static equivalence. In Foundations of Software Science and Computation Structure (FoSSaCS'06), volume 3921 of LNCS, pages 398-412, 2006.
-
(2006)
LNCS
, vol.3921
, pp. 398-412
-
-
Abadi, M.1
Baudet, M.2
Warinschi, B.3
-
3
-
-
84978977131
-
-
M. Abadi and J. Jürgens. Formal eavesdropping and its computational interpretation. In Theoretical Aspects of Computer Software, LNCS 2215, 2001
-
M. Abadi and J. Jürgens. Formal eavesdropping and its computational interpretation. In Theoretical Aspects of Computer Software, LNCS 2215, 2001.
-
-
-
-
4
-
-
70349290319
-
Reconciling two views of cryptography: The computational soundness of formal encryption
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography: the computational soundness of formal encryption. J. Cryptology, 2007.
-
(2007)
J. Cryptology
-
-
Abadi, M.1
Rogaway, P.2
-
7
-
-
38349134008
-
-
M. Backes, M. Dürmuth, and R. Küsters. On simulatability soundness and mapping soundness of symbolic cryptograph}'. In Proc. of 27th FSTTCS, 4855 of LNCS, 2007.
-
M. Backes, M. Dürmuth, and R. Küsters. On simulatability soundness and mapping soundness of symbolic cryptograph}'. In Proc. of 27th FSTTCS, volume 4855 of LNCS, 2007.
-
-
-
-
11
-
-
84855205195
-
The reactive simulatability (RSIM) framework for asynchronous systems
-
M. Backes, B. Pfitzmann, and M. Waidner. The reactive simulatability (RSIM) framework for asynchronous systems. Information and Commutation, 205(12) :1685-1720, 2007.
-
(2007)
Information and Commutation
, vol.205
, Issue.12
, pp. 1685-1720
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
12
-
-
26444541858
-
Computationally sound implementations of equational theories against passive adversaries
-
Proc. ICALP'05, of
-
M. Baudet, V. Cortier, and S. Kremer. Computationally sound implementations of equational theories against passive adversaries. In Proc. ICALP'05, volume 3580 of LNCS, 2005.
-
(2005)
LNCS
, vol.3580
-
-
Baudet, M.1
Cortier, V.2
Kremer, S.3
-
13
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Advances in Cryptology ASIACRYPT 2000, of
-
M. Bellare and C. Namprempre. Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology (ASIACRYPT 2000), volume 1976 of LNCS, pages 531-545, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
15
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
B. Blanchet, M. Abadi, and C. Fournet. Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming, 75(1):3-51, 2008.
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
16
-
-
0004215976
-
A logic of authentication
-
Technical Report 39, Digital Systems Research Center, February
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Technical Report 39, Digital Systems Research Center, February 1989.
-
(1989)
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
17
-
-
0035163054
-
Universal composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universal composable security: a new paradigm for cryptographic protocols. In Symposium on Foundations of Computer Science, 2001.
-
(2001)
Symposium on Foundations of Computer Science
-
-
Canetti, R.1
-
20
-
-
70350534740
-
Computational soundness of observational equivalence
-
6508, INRIA, Apr
-
H. Comon-Lundh and V. Cortier. Computational soundness of observational equivalence. Research Report 6508, INRIA, https://hal. inria.fr/inria-00274158, Apr. 2008.
-
(2008)
Research Report
-
-
Comon-Lundh, H.1
Cortier, V.2
-
21
-
-
84962447835
-
Computationally sound symbolic secrecy in the presence of hash functions
-
Proc. FSTTCS, of
-
V. Cortier, S. Kremer, R. Küsters, and B. Warinschi. Computationally sound symbolic secrecy in the presence of hash functions. In Proc. FSTTCS, volume 4337 of LNCS, pages 176-187, 2006.
-
(2006)
LNCS
, vol.4337
, pp. 176-187
-
-
Cortier, V.1
Kremer, S.2
Küsters, R.3
Warinschi, B.4
-
22
-
-
24644437051
-
Computationally sound, automated proofs for security protocols
-
European Symposium on Programming ESOP'05, of
-
V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols. In European Symposium on Programming (ESOP'05), volume 3444 of LNCS, pages 157-171, 2005.
-
(2005)
LNCS
, vol.3444
, pp. 157-171
-
-
Cortier, V.1
Warinschi, B.2
-
24
-
-
38349000896
-
Symbolic bisimulation for the applied pi-calculus
-
Foundations of Software Technology and Theoretical Computer Science FSTTCS'07, of
-
S. Delaune, S. Kremer, and M. D. Ryan. Symbolic bisimulation for the applied pi-calculus. In Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07)', volume 4855 of LNCS, pages 133-145, 2007.
-
(2007)
LNCS
, vol.4855
, pp. 133-145
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
25
-
-
26844495970
-
Deciding framed bisimilarity
-
H. Hüttel. Deciding framed bisimilarity. In Proc. INFINITY'02, 2002.
-
(2002)
Proc. INFINITY'02
-
-
Hüttel, H.1
-
26
-
-
24644476184
-
Completing the picture: Soundness of formal encryption in the presence of active adversaries
-
European Symposium on Programming ESOP'05, of, Springer
-
R. Janvier, Y. Lakhnech, and L. Mazaré. Completing the picture: Soundness of formal encryption in the presence of active adversaries. In European Symposium on Programming (ESOP'05), volume 3444 of LNCS, pages 172-185. Springer, 2005.
-
(2005)
LNCS
, vol.3444
, pp. 172-185
-
-
Janvier, R.1
Lakhnech, Y.2
Mazaré, L.3
-
27
-
-
84958591696
-
Security of blind digital signatures
-
In advances in cryptology, CRYPTO-97, of
-
A. Juels, M. Luby, and R. Ostrovsky. Security of blind digital signatures. In advances in cryptology, (CRYPTO-97), volume 1294 of LNCS, pages 150-164, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 150-164
-
-
Juels, A.1
Luby, M.2
Ostrovsky, R.3
-
28
-
-
38049000874
-
Adaptive soundness of static equivalence
-
European Symposium on Research m Computer Security ESORICS'07, of
-
S. Kremer and L. Mazaré. Adaptive soundness of static equivalence. In European Symposium on Research m Computer Security (ESORICS'07), volume 4734 of LNCS, pages 610-625, 2007.
-
(2007)
LNCS
, vol.4734
, pp. 610-625
-
-
Kremer, S.1
Mazaré, L.2
-
29
-
-
51749119261
-
Joint state theorems for public-key encryption and digital signature functionalities with local computations
-
R. Küsters and M. Tuengerthal. Joint state theorems for public-key encryption and digital signature functionalities with local computations. In Computer Security Foundations (CSF'08), 2008.
-
(2008)
Computer Security Foundations (CSF'08)
-
-
Küsters, R.1
Tuengerthal, M.2
-
30
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Symp. on Security and Privacy (SSP'04), pages 71-85, 2004.
-
(2004)
Symp. on Security and Privacy (SSP'04)
, pp. 71-85
-
-
Laud, P.1
-
31
-
-
0344875571
-
Completeness theorems for the Abadi-Rogaway language of encrypted expressions
-
D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway language of encrypted expressions. Journal of Computer Security, 2004.
-
(2004)
Journal of Computer Security
-
-
Micciancio, D.1
Warinschi, B.2
-
32
-
-
35048899313
-
Soundness of formal encryption in presence of an active attacker
-
Theory of Cryptography Conference TCC'04, of
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in presence of an active attacker. In Theory of Cryptography Conference (TCC'04), volume 2951 of LNCS, 2004.
-
(2004)
LNCS
, vol.2951
-
-
Micciancio, D.1
Warinschi, B.2
-
33
-
-
33244491452
-
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
-
J. Mitchell, A. Ramanathan, and V. Teague. A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theoretical Comput. Sci., 353:118-164, 2006.
-
(2006)
Theoretical Comput. Sci
, vol.353
, pp. 118-164
-
-
Mitchell, J.1
Ramanathan, A.2
Teague, V.3
|