-
1
-
-
84879078812
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Jan van Leeuwen, Osamu Watanabe, Masami Hagiya, Peter D. Mosses, and Takayasu Ito, editors, Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics, International Conference IFIPTCS 2000, of, Springer-Verlag
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Jan van Leeuwen, Osamu Watanabe, Masami Hagiya, Peter D. Mosses, and Takayasu Ito, editors, Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics, International Conference (IFIPTCS 2000), volume 1872 of Lecture Notes in Computer Science, pages 3-22. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
35048853239
-
How to Break and Repair a Universally Composable Signature Functionality
-
Kan Zhang and Yuliang Zheng, editors, Information Security, 7th International Conference, ISC 2004, Proceedings, of, Springer
-
M. Backes and D. Hofheinz. How to Break and Repair a Universally Composable Signature Functionality. In Kan Zhang and Yuliang Zheng, editors, Information Security, 7th International Conference, ISC 2004, Proceedings, volume 3225 of Lecture Notes in Computer Science, pages 61-72. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3225
, pp. 61-72
-
-
Backes, M.1
Hofheinz, D.2
-
4
-
-
54349106924
-
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
-
M. Backes, B. Pfitzmann, and A. Scedrov. Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. Journal of Computer Security (JCS), 2008.
-
(2008)
Journal of Computer Security (JCS)
-
-
Backes, M.1
Pfitzmann, B.2
Scedrov, A.3
-
6
-
-
84937407719
-
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
-
Tatsuaki Okamoto, editor, Advances in Cryptology, ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, 2000, Proceedings, of, Springer
-
M. Bellare and C. Namprempre. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, 2000, Proceedings, volume 1976 of Lecture Notes in Computer Science, pages 531-545. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
8
-
-
35248822352
-
Encryption-Scheme Security in the Presence of Key-Dependent Messages
-
Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, 9th Annual International Workshop SAC 2002, of, Springer
-
J. Black, Ph. Rogaway, and Th. Shrimpton. Encryption-Scheme Security in the Presence of Key-Dependent Messages. In Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, 9th Annual International Workshop (SAC 2002), volume 2595 of Lecture Notes in Computer Science, pages 62-75. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2595
, pp. 62-75
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
9
-
-
33751067991
-
A Computationally Sound Mechanized Prover for Security Protocols
-
IEEE Computer Society
-
B. Blanchet. A Computationally Sound Mechanized Prover for Security Protocols. In IEEE Symposium on Security and Privacy (S&P 2006), pages 140-154. IEEE Computer Society, 2006.
-
(2006)
IEEE Symposium on Security and Privacy (S&P 2006)
, pp. 140-154
-
-
Blanchet, B.1
-
13
-
-
28144462281
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
Technical Report 2000/067, Cryptology ePrint Archive, December 2005. Online available at
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Technical Report 2000/067, Cryptology ePrint Archive, December 2005. Online available at http://eprint.iacr.org/.
-
-
-
Canetti, R.1
-
14
-
-
46749100869
-
Security and Composition of Cryptographic Protocols: A Tutorial. Cryptology ePrint Archive
-
Report 2006/465, Online available at
-
R. Canetti. Security and Composition of Cryptographic Protocols: A Tutorial. Cryptology ePrint Archive, Report 2006/465, 2006. Online available at http://eprint.iacr.org/.
-
(2006)
-
-
Canetti, R.1
-
15
-
-
38049064364
-
Universally Composable Security with Global Setup
-
Salil P. Vadhan, editor, Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Proceedings, of, Springer
-
R. Canetti, Y. Dodis, R. Pass, and S. Walfish. Universally Composable Security with Global Setup. In Salil P. Vadhan, editor, Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Proceedings, volume 4392 of Lecture Notes in Computer Science, pages 61-85. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4392
, pp. 61-85
-
-
Canetti, R.1
Dodis, Y.2
Pass, R.3
Walfish, S.4
-
16
-
-
84880897758
-
Universally Composable Commitments
-
Joe Kilian, editor, Advances in Cryptology, CRYPTO 2001, 21st Annual International Cryptology Conference, of, Springer
-
R. Canetti and M. Fischlin. Universally Composable Commitments. In Joe Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, volume 2139 of Lecture Notes in Computer Science, pages 19-40. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
17
-
-
33745528593
-
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols
-
Shai Halevi and Tal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, Proceedings, of, Springer
-
R. Canetti and J. Herzog. Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. In Shai Halevi and Tal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, Proceedings, volume 3876 of Lecture Notes in Computer Science, pages 380-403. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 380-403
-
-
Canetti, R.1
Herzog, J.2
-
18
-
-
84947232363
-
Universally Composable Notions of Key Exchange and Secure Channels
-
Lars R. Knudsen, editor, Advances in Cryptology, EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, of, Springer
-
R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. In Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, volume 2332 of Lecture Notes in Computer Science, pages 337-351. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 337-351
-
-
Canetti, R.1
Krawczyk, H.2
-
19
-
-
60549110127
-
Computational soundness of observational equivalence
-
Peng Ning, Paul F. Syverson, and Somesh Jha, editors, ACM Press
-
H. Comon-Lundh and V. Cortier. Computational soundness of observational equivalence. In Peng Ning, Paul F. Syverson, and Somesh Jha, editors, Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), pages 109-118. ACM Press, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)
, pp. 109-118
-
-
Comon-Lundh, H.1
Cortier, V.2
-
20
-
-
70350534740
-
Computational soundness of observational equivalence
-
RR-6508, INRIA, Online available at
-
H. Comon-Lundh and V. Cortier. Computational soundness of observational equivalence. Technical Report INRIA Research Report RR-6508, INRIA, 2008. Online available at http://www.loria.fr/?cortier/Papiers/CCS08-report.pdf.
-
(2008)
Technical Report INRIA Research Report
-
-
Comon-Lundh, H.1
Cortier, V.2
-
21
-
-
33745534937
-
Games and the Impossibility of Realizable Ideal Functionality
-
Shai Halevi and Tal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, Proceedings, of, Springer
-
A. Datta, A. Derek, J. C. Mitchell, A. Ramanathan, and A. Scedrov. Games and the Impossibility of Realizable Ideal Functionality. In Shai Halevi and Tal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, Proceedings, volume 3876 of Lecture Notes in Computer Science, pages 360-379. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 360-379
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Ramanathan, A.4
Scedrov, A.5
-
22
-
-
33947704230
-
Computationally Sound Compositional Logic for Key Exchange Protocols
-
IEEE Computer Society
-
A. Datta, A. Derek, J. C. Mitchell, and B. Warinschi. Computationally Sound Compositional Logic for Key Exchange Protocols. In Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW-19 2006), pages 321-334. IEEE Computer Society, 2006.
-
(2006)
Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW-19 2006)
, pp. 321-334
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Warinschi, B.4
-
25
-
-
51749119261
-
Joint State Theorems for Public-Key Encryption and Digitial Signature Functionalities with Local Computation
-
IEEE Computer Society
-
R. Küsters and M. Tuengerthal. Joint State Theorems for Public-Key Encryption and Digitial Signature Functionalities with Local Computation. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pages 270-284. IEEE Computer Society, 2008.
-
(2008)
Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008)
, pp. 270-284
-
-
Küsters, R.1
Tuengerthal, M.2
-
26
-
-
70350552252
-
-
R. Küsters and M. Tuengerthal. Universally Composable Symmetric Encryption. Technical Report 2009/055, Cryp-tology ePrint Archive, 2009. Online available at http://eprint. iacr.org/.
-
R. Küsters and M. Tuengerthal. Universally Composable Symmetric Encryption. Technical Report 2009/055, Cryp-tology ePrint Archive, 2009. Online available at http://eprint. iacr.org/.
-
-
-
-
27
-
-
3543052976
-
Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries
-
IEEE Computer Society
-
P. Laud. Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. In IEEE Symposium on Security and Privacy 2004 (S&P 2004), pages 71-85. IEEE Computer Society, 2004.
-
(2004)
IEEE Symposium on Security and Privacy 2004 (S&P 2004)
, pp. 71-85
-
-
Laud, P.1
-
29
-
-
0034823388
-
-
B. Pfitzmann and M. Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In IEEE Symposium on Security and Privacy 2001 (S&P 2001), pages 184-201. IEEE Computer Society Press, 2001.
-
B. Pfitzmann and M. Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In IEEE Symposium on Security and Privacy 2001 (S&P 2001), pages 184-201. IEEE Computer Society Press, 2001.
-
-
-
-
30
-
-
38049030237
-
Inductive Proofs of Computational Secrecy
-
Joachim Biskup and Javier Lopez, editors, Proceedings of the 12th European Symposium On Research In Computer Security ESORICS 2007, of, Springer
-
A. Roy, A. Datta, A. Derek, and J. C. Mitchell. Inductive Proofs of Computational Secrecy. In Joachim Biskup and Javier Lopez, editors, Proceedings of the 12th European Symposium On Research In Computer Security (ESORICS 2007), volume 4734 of Lecture Notes in Computer Science, pages 219-234. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4734
, pp. 219-234
-
-
Roy, A.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
|