메뉴 건너뛰기




Volumn , Issue , 2008, Pages 109-118

Computational soundness of observational equivalence

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL SOUNDNESS; NEW CONCEPT; OBSERVATIONAL EQUIVALENCES; PUBLIC-KEY ENCRYPTION; SECURITY PRIMITIVES; SECURITY PROPERTIES; SYMMETRIC ENCRYPTION;

EID: 60549110127     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455786     Document Type: Conference Paper
Times cited : (68)

References (33)
  • 1
    • 33745790245 scopus 로고    scopus 로고
    • Guessing attacks and the computational soundness of static equivalence
    • Foundations of Software Science and Computation Structure FoSSaCS'06, of
    • M. Abadi, M. Baudet, and B. Warinschi. Guessing attacks and the computational soundness of static equivalence. In Foundations of Software Science and Computation Structure (FoSSaCS'06), volume 3921 of LNCS, pages 398-412, 2006.
    • (2006) LNCS , vol.3921 , pp. 398-412
    • Abadi, M.1    Baudet, M.2    Warinschi, B.3
  • 3
    • 84978977131 scopus 로고    scopus 로고
    • M. Abadi and J. Jürgens. Formal eavesdropping and its computational interpretation. In Theoretical Aspects of Computer Software, LNCS 2215, 2001
    • M. Abadi and J. Jürgens. Formal eavesdropping and its computational interpretation. In Theoretical Aspects of Computer Software, LNCS 2215, 2001.
  • 4
    • 70349290319 scopus 로고    scopus 로고
    • Reconciling two views of cryptography: The computational soundness of formal encryption
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography: the computational soundness of formal encryption. J. Cryptology, 2007.
    • (2007) J. Cryptology
    • Abadi, M.1    Rogaway, P.2
  • 7
    • 38349134008 scopus 로고    scopus 로고
    • M. Backes, M. Dürmuth, and R. Küsters. On simulatability soundness and mapping soundness of symbolic cryptograph}'. In Proc. of 27th FSTTCS, 4855 of LNCS, 2007.
    • M. Backes, M. Dürmuth, and R. Küsters. On simulatability soundness and mapping soundness of symbolic cryptograph}'. In Proc. of 27th FSTTCS, volume 4855 of LNCS, 2007.
  • 11
    • 84855205195 scopus 로고    scopus 로고
    • The reactive simulatability (RSIM) framework for asynchronous systems
    • M. Backes, B. Pfitzmann, and M. Waidner. The reactive simulatability (RSIM) framework for asynchronous systems. Information and Commutation, 205(12) :1685-1720, 2007.
    • (2007) Information and Commutation , vol.205 , Issue.12 , pp. 1685-1720
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 12
    • 26444541858 scopus 로고    scopus 로고
    • Computationally sound implementations of equational theories against passive adversaries
    • Proc. ICALP'05, of
    • M. Baudet, V. Cortier, and S. Kremer. Computationally sound implementations of equational theories against passive adversaries. In Proc. ICALP'05, volume 3580 of LNCS, 2005.
    • (2005) LNCS , vol.3580
    • Baudet, M.1    Cortier, V.2    Kremer, S.3
  • 13
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Advances in Cryptology ASIACRYPT 2000, of
    • M. Bellare and C. Namprempre. Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology (ASIACRYPT 2000), volume 1976 of LNCS, pages 531-545, 2000.
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 16
    • 0004215976 scopus 로고
    • A logic of authentication
    • Technical Report 39, Digital Systems Research Center, February
    • M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Technical Report 39, Digital Systems Research Center, February 1989.
    • (1989)
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 17
    • 0035163054 scopus 로고    scopus 로고
    • Universal composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universal composable security: a new paradigm for cryptographic protocols. In Symposium on Foundations of Computer Science, 2001.
    • (2001) Symposium on Foundations of Computer Science
    • Canetti, R.1
  • 20
    • 70350534740 scopus 로고    scopus 로고
    • Computational soundness of observational equivalence
    • 6508, INRIA, Apr
    • H. Comon-Lundh and V. Cortier. Computational soundness of observational equivalence. Research Report 6508, INRIA, https://hal. inria.fr/inria-00274158, Apr. 2008.
    • (2008) Research Report
    • Comon-Lundh, H.1    Cortier, V.2
  • 21
    • 84962447835 scopus 로고    scopus 로고
    • Computationally sound symbolic secrecy in the presence of hash functions
    • Proc. FSTTCS, of
    • V. Cortier, S. Kremer, R. Küsters, and B. Warinschi. Computationally sound symbolic secrecy in the presence of hash functions. In Proc. FSTTCS, volume 4337 of LNCS, pages 176-187, 2006.
    • (2006) LNCS , vol.4337 , pp. 176-187
    • Cortier, V.1    Kremer, S.2    Küsters, R.3    Warinschi, B.4
  • 22
    • 24644437051 scopus 로고    scopus 로고
    • Computationally sound, automated proofs for security protocols
    • European Symposium on Programming ESOP'05, of
    • V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols. In European Symposium on Programming (ESOP'05), volume 3444 of LNCS, pages 157-171, 2005.
    • (2005) LNCS , vol.3444 , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 24
    • 38349000896 scopus 로고    scopus 로고
    • Symbolic bisimulation for the applied pi-calculus
    • Foundations of Software Technology and Theoretical Computer Science FSTTCS'07, of
    • S. Delaune, S. Kremer, and M. D. Ryan. Symbolic bisimulation for the applied pi-calculus. In Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07)', volume 4855 of LNCS, pages 133-145, 2007.
    • (2007) LNCS , vol.4855 , pp. 133-145
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 25
    • 26844495970 scopus 로고    scopus 로고
    • Deciding framed bisimilarity
    • H. Hüttel. Deciding framed bisimilarity. In Proc. INFINITY'02, 2002.
    • (2002) Proc. INFINITY'02
    • Hüttel, H.1
  • 26
    • 24644476184 scopus 로고    scopus 로고
    • Completing the picture: Soundness of formal encryption in the presence of active adversaries
    • European Symposium on Programming ESOP'05, of, Springer
    • R. Janvier, Y. Lakhnech, and L. Mazaré. Completing the picture: Soundness of formal encryption in the presence of active adversaries. In European Symposium on Programming (ESOP'05), volume 3444 of LNCS, pages 172-185. Springer, 2005.
    • (2005) LNCS , vol.3444 , pp. 172-185
    • Janvier, R.1    Lakhnech, Y.2    Mazaré, L.3
  • 27
    • 84958591696 scopus 로고    scopus 로고
    • Security of blind digital signatures
    • In advances in cryptology, CRYPTO-97, of
    • A. Juels, M. Luby, and R. Ostrovsky. Security of blind digital signatures. In advances in cryptology, (CRYPTO-97), volume 1294 of LNCS, pages 150-164, 1997.
    • (1997) LNCS , vol.1294 , pp. 150-164
    • Juels, A.1    Luby, M.2    Ostrovsky, R.3
  • 28
    • 38049000874 scopus 로고    scopus 로고
    • Adaptive soundness of static equivalence
    • European Symposium on Research m Computer Security ESORICS'07, of
    • S. Kremer and L. Mazaré. Adaptive soundness of static equivalence. In European Symposium on Research m Computer Security (ESORICS'07), volume 4734 of LNCS, pages 610-625, 2007.
    • (2007) LNCS , vol.4734 , pp. 610-625
    • Kremer, S.1    Mazaré, L.2
  • 29
    • 51749119261 scopus 로고    scopus 로고
    • Joint state theorems for public-key encryption and digital signature functionalities with local computations
    • R. Küsters and M. Tuengerthal. Joint state theorems for public-key encryption and digital signature functionalities with local computations. In Computer Security Foundations (CSF'08), 2008.
    • (2008) Computer Security Foundations (CSF'08)
    • Küsters, R.1    Tuengerthal, M.2
  • 30
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Symp. on Security and Privacy (SSP'04), pages 71-85, 2004.
    • (2004) Symp. on Security and Privacy (SSP'04) , pp. 71-85
    • Laud, P.1
  • 31
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the Abadi-Rogaway language of encrypted expressions
    • D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway language of encrypted expressions. Journal of Computer Security, 2004.
    • (2004) Journal of Computer Security
    • Micciancio, D.1    Warinschi, B.2
  • 32
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in presence of an active attacker
    • Theory of Cryptography Conference TCC'04, of
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in presence of an active attacker. In Theory of Cryptography Conference (TCC'04), volume 2951 of LNCS, 2004.
    • (2004) LNCS , vol.2951
    • Micciancio, D.1    Warinschi, B.2
  • 33
    • 33244491452 scopus 로고    scopus 로고
    • A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
    • J. Mitchell, A. Ramanathan, and V. Teague. A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theoretical Comput. Sci., 353:118-164, 2006.
    • (2006) Theoretical Comput. Sci , vol.353 , pp. 118-164
    • Mitchell, J.1    Ramanathan, A.2    Teague, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.