메뉴 건너뛰기




Volumn , Issue , 2009, Pages 237-250

Formally certifying the security of digital signature schemes

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL MODEL; COQ PROOF ASSISTANT; CRYPTOGRAPHIC SYSTEMS; DIGITAL SIGNATURE SCHEMES; EXACT SECURITY; HASH SIGNATURE; MESSAGE ATTACK; OPTIMAL REDUCTIONS; TWO MACHINES; UNFORGEABILITY;

EID: 70449646572     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.17     Document Type: Conference Paper
Times cited : (15)

References (20)
  • 1
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • S. Goldwasser and S. Micali, "Probabilistic encryption." J. Comput. Syst. Sci., vol.28, no.2, pp. 270-299, 1984.
    • (1984) J. Comput. Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 2
    • 35248867842 scopus 로고    scopus 로고
    • Why provable security matters?
    • ser. Lecture Notes in Computer Science, Springer-Verlag
    • J. Stern, "Why provable security matters?" in Advances in Cryptology - EUROCRYPT'03, ser. Lecture Notes in Computer Science, vol.2656. Springer-Verlag, 2003, pp. 449-461.
    • (2003) Advances in Cryptology - EUROCRYPT'03 , vol.2656 , pp. 449-461
    • Stern, J.1
  • 3
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • ser. Lecture Notes in Computer Science, Springer-Verlag
    • M. Bellare and P. Rogaway, "The security of triple encryption and a framework for code-based game-playing proofs," in Advances in Cryptology - EUROCRYPT'06, ser. Lecture Notes in Computer Science, vol.4004. Springer-Verlag, 2006, pp. 409-426.
    • (2006) Advances in Cryptology - EUROCRYPT'06 , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • Report 2004/332
    • V. Shoup, "Sequences of games: a tool for taming complexity in security proofs," Cryptology ePrint Archive, Report 2004/332, 2004.
    • (2004) Cryptology ePrint Archive
    • Shoup, V.1
  • 6
    • 33746336609 scopus 로고    scopus 로고
    • A plausible approach to computer-aided cryptographic proofs
    • Report 2005/181
    • S. Halevi, "A plausible approach to computer-aided cryptographic proofs," Cryptology ePrint Archive, Report 2005/181, 2005.
    • (2005) Cryptology ePrint Archive
    • Halevi, S.1
  • 7
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • IEEE Computer Society
    • B. Blanchet, "A computationally sound mechanized prover for security protocols," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2006, pp. 140-154.
    • (2006) IEEE Symposium on Security and Privacy , pp. 140-154
    • Blanchet, B.1
  • 8
    • 33749579704 scopus 로고    scopus 로고
    • Automated security proofs with sequences of games
    • ser. Lecture Notes in Computer Science, Springer-Verlag
    • B. Blanchet and D. Pointcheval, "Automated security proofs with sequences of games," in Advances in Cryptology - CRYPTO'06, ser. Lecture Notes in Computer Science, vol.4117. Springer-Verlag, 2006, pp. 537-554.
    • (2006) Advances in Cryptology - CRYPTO'06 , vol.4117 , pp. 537-554
    • Blanchet, B.1    Pointcheval, D.2
  • 9
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of Full Domain Hash
    • ser. Lecture Notes in Computer Science, Springer-Verlag
    • J.-S. Coron, "On the exact security of Full Domain Hash," in Advances in Cryptology, ser. Lecture Notes in Computer Science, vol.1880. Springer-Verlag, 2000, pp. 229-235.
    • (2000) Advances in Cryptology , vol.1880 , pp. 229-235
    • Coron, J.-S.1
  • 13
    • 33745189623 scopus 로고    scopus 로고
    • Formal certification of a compiler back-end, or: Programming a compiler with a proof assistant
    • ACM Press
    • X. Leroy, "Formal certification of a compiler back-end, or: programming a compiler with a proof assistant," in Proceedings of the 33rd ACM Symposium Principles of Programming Languages. ACM Press, 2006, pp. 42-54.
    • (2006) Proceedings of the 33rd ACM Symposium Principles of Programming Languages , pp. 42-54
    • Leroy, X.1
  • 14
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - How to sign with RSA and Rabin
    • ser. Lecture Notes in Computer Science, Springer-Verlag
    • M. Bellare and P. Rogaway, "The exact security of digital signatures - How to sign with RSA and Rabin," in Advances in Cryptology - EUROCRYPT'96, ser. Lecture Notes in Computer Science, vol.1070. Springer-Verlag, 1996, pp. 399-416.
    • (1996) Advances in Cryptology - EUROCRYPT'96 , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 16
    • 84947215491 scopus 로고    scopus 로고
    • Optimal security proofs for PSS and other signature schemes
    • ser. Lecture Notes in Computer Science, Springer-Verlag
    • J.-S. Coron, "Optimal security proofs for PSS and other signature schemes," in Advances in Cryptology - EUROCRYPT'02, ser. Lecture Notes in Computer Science, vol.2332. Springer-Verlag, 2002, pp. 272-287.
    • (2002) Advances in Cryptology - EUROCRYPT'02 , vol.2332 , pp. 272-287
    • Coron, J.-S.1
  • 18
    • 38148999450 scopus 로고    scopus 로고
    • A framework for game-based security proofs
    • Springer-Verlag
    • D. Nowak, "A framework for game-based security proofs," in Information and Communications Security, vol.4861. Springer-Verlag, 2007, pp. 319-333.
    • (2007) Information and Communications Security , vol.4861 , pp. 319-333
    • Nowak, D.1
  • 19
    • 38149007757 scopus 로고    scopus 로고
    • Formal proof of provable security by game-playing in a proof assistant
    • ser. Lecture Notes in Computer Science, Springer-Verlag
    • R. Affeldt, M. Tanaka, and N. Marti, "Formal proof of provable security by game-playing in a proof assistant," in Proceedings of International Conference on Provable Security, ser. Lecture Notes in Computer Science, vol.4784. Springer-Verlag, 2007, pp. 151-168.
    • (2007) Proceedings of International Conference on Provable Security , vol.4784 , pp. 151-168
    • Affeldt, R.1    Tanaka, M.2    Marti, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.