-
1
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali, "Probabilistic encryption." J. Comput. Syst. Sci., vol.28, no.2, pp. 270-299, 1984.
-
(1984)
J. Comput. Syst. Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
2
-
-
35248867842
-
Why provable security matters?
-
ser. Lecture Notes in Computer Science, Springer-Verlag
-
J. Stern, "Why provable security matters?" in Advances in Cryptology - EUROCRYPT'03, ser. Lecture Notes in Computer Science, vol.2656. Springer-Verlag, 2003, pp. 449-461.
-
(2003)
Advances in Cryptology - EUROCRYPT'03
, vol.2656
, pp. 449-461
-
-
Stern, J.1
-
3
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
ser. Lecture Notes in Computer Science, Springer-Verlag
-
M. Bellare and P. Rogaway, "The security of triple encryption and a framework for code-based game-playing proofs," in Advances in Cryptology - EUROCRYPT'06, ser. Lecture Notes in Computer Science, vol.4004. Springer-Verlag, 2006, pp. 409-426.
-
(2006)
Advances in Cryptology - EUROCRYPT'06
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
54049154396
-
-
Birkhauser
-
D. Catalano, R. Cramer, I. Damgard, G. D. Crescenzo, D. Pointcheval, and T. Takagi, Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona). Birkhauser, 2005.
-
(2005)
Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona)
-
-
Catalano, D.1
Cramer, R.2
Damgard, I.3
Crescenzo, G.D.4
Pointcheval, D.5
Takagi, T.6
-
5
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
Report 2004/332
-
V. Shoup, "Sequences of games: a tool for taming complexity in security proofs," Cryptology ePrint Archive, Report 2004/332, 2004.
-
(2004)
Cryptology ePrint Archive
-
-
Shoup, V.1
-
6
-
-
33746336609
-
A plausible approach to computer-aided cryptographic proofs
-
Report 2005/181
-
S. Halevi, "A plausible approach to computer-aided cryptographic proofs," Cryptology ePrint Archive, Report 2005/181, 2005.
-
(2005)
Cryptology ePrint Archive
-
-
Halevi, S.1
-
7
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
IEEE Computer Society
-
B. Blanchet, "A computationally sound mechanized prover for security protocols," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2006, pp. 140-154.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 140-154
-
-
Blanchet, B.1
-
8
-
-
33749579704
-
Automated security proofs with sequences of games
-
ser. Lecture Notes in Computer Science, Springer-Verlag
-
B. Blanchet and D. Pointcheval, "Automated security proofs with sequences of games," in Advances in Cryptology - CRYPTO'06, ser. Lecture Notes in Computer Science, vol.4117. Springer-Verlag, 2006, pp. 537-554.
-
(2006)
Advances in Cryptology - CRYPTO'06
, vol.4117
, pp. 537-554
-
-
Blanchet, B.1
Pointcheval, D.2
-
9
-
-
84921068281
-
On the exact security of Full Domain Hash
-
ser. Lecture Notes in Computer Science, Springer-Verlag
-
J.-S. Coron, "On the exact security of Full Domain Hash," in Advances in Cryptology, ser. Lecture Notes in Computer Science, vol.1880. Springer-Verlag, 2000, pp. 229-235.
-
(2000)
Advances in Cryptology
, vol.1880
, pp. 229-235
-
-
Coron, J.-S.1
-
10
-
-
70350323754
-
Formal certification of code-based cryptographic proofs
-
ACM Press
-
G. Barthe, B. Grégoire, and S. Zanella Béguelin, "Formal certification of code-based cryptographic proofs," in Proceedings of the 36th ACM Symposium on Principles of Programming Languages. ACM Press, 2009, pp. 90-101.
-
(2009)
Proceedings of the 36th ACM Symposium on Principles of Programming Languages
, pp. 90-101
-
-
Barthe, G.1
Grégoire, B.2
Zanella Béguelin, S.3
-
11
-
-
84888530456
-
Formal certification of ElGamal encryption. A gentle introduction to CertiCrypt
-
ser. Lecture Notes in Computer Science. Springer-Verlag, in press
-
G. Barthe, B. Grégoire, S. Heraud, and S. Zanella Béguelin, "Formal certification of ElGamal encryption. A gentle introduction to CertiCrypt," in 5th International Workshop on Formal Aspects in Security and Trust, FAST 2008, ser. Lecture Notes in Computer Science. Springer-Verlag, 2008, in press.
-
(2008)
5th International Workshop on Formal Aspects in Security and Trust, FAST 2008
-
-
Barthe, G.1
Grégoire, B.2
Heraud, S.3
Zanella Béguelin, S.4
-
13
-
-
33745189623
-
Formal certification of a compiler back-end, or: Programming a compiler with a proof assistant
-
ACM Press
-
X. Leroy, "Formal certification of a compiler back-end, or: programming a compiler with a proof assistant," in Proceedings of the 33rd ACM Symposium Principles of Programming Languages. ACM Press, 2006, pp. 42-54.
-
(2006)
Proceedings of the 33rd ACM Symposium Principles of Programming Languages
, pp. 42-54
-
-
Leroy, X.1
-
14
-
-
84947906522
-
The exact security of digital signatures - How to sign with RSA and Rabin
-
ser. Lecture Notes in Computer Science, Springer-Verlag
-
M. Bellare and P. Rogaway, "The exact security of digital signatures - How to sign with RSA and Rabin," in Advances in Cryptology - EUROCRYPT'96, ser. Lecture Notes in Computer Science, vol.1070. Springer-Verlag, 1996, pp. 399-416.
-
(1996)
Advances in Cryptology - EUROCRYPT'96
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
16
-
-
84947215491
-
Optimal security proofs for PSS and other signature schemes
-
ser. Lecture Notes in Computer Science, Springer-Verlag
-
J.-S. Coron, "Optimal security proofs for PSS and other signature schemes," in Advances in Cryptology - EUROCRYPT'02, ser. Lecture Notes in Computer Science, vol.2332. Springer-Verlag, 2002, pp. 272-287.
-
(2002)
Advances in Cryptology - EUROCRYPT'02
, vol.2332
, pp. 272-287
-
-
Coron, J.-S.1
-
17
-
-
70349275452
-
Towards automated proofs for asymmetric encryption schemes in the random oracle model
-
ACM Press
-
J. Courant, M. Daubignard, C. Ene, P. Lafourcade, and Y. Lakhnech, "Towards automated proofs for asymmetric encryption schemes in the random oracle model," in Proceedings of the 15th ACM Conference on Computer and Communications Security. ACM Press, 2008, pp. 371-380.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 371-380
-
-
Courant, J.1
Daubignard, M.2
Ene, C.3
Lafourcade, P.4
Lakhnech, Y.5
-
18
-
-
38148999450
-
A framework for game-based security proofs
-
Springer-Verlag
-
D. Nowak, "A framework for game-based security proofs," in Information and Communications Security, vol.4861. Springer-Verlag, 2007, pp. 319-333.
-
(2007)
Information and Communications Security
, vol.4861
, pp. 319-333
-
-
Nowak, D.1
-
19
-
-
38149007757
-
Formal proof of provable security by game-playing in a proof assistant
-
ser. Lecture Notes in Computer Science, Springer-Verlag
-
R. Affeldt, M. Tanaka, and N. Marti, "Formal proof of provable security by game-playing in a proof assistant," in Proceedings of International Conference on Provable Security, ser. Lecture Notes in Computer Science, vol.4784. Springer-Verlag, 2007, pp. 151-168.
-
(2007)
Proceedings of International Conference on Provable Security
, vol.4784
, pp. 151-168
-
-
Affeldt, R.1
Tanaka, M.2
Marti, N.3
-
20
-
-
58049108667
-
A formal language for cryptographic pseudocode
-
Springer-Verlag
-
M. Backes, M. Berg, and D. Unruh, "A formal language for cryptographic pseudocode," in Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR'08). Springer-Verlag, 2008, pp. 353-376.
-
(2008)
Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR'08)
, pp. 353-376
-
-
Backes, M.1
Berg, M.2
Unruh, D.3
|