-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
AR02
-
[AR02] Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
70349280183
-
Type-checking zero-knowledge
-
BHM08
-
[BHM08] Backes, M., Hritcu, C., Maffei, M.: Type-checking zero-knowledge. In: ACM Conference on Computer and Communications Security, pp. 357-370 (2008)
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 357-370
-
-
Backes, M.1
Hritcu, C.2
Maffei, M.3
-
4
-
-
50249164303
-
Zero-Knowledge in the Applied Picalculus and Automated Verification of the Direct Anonymous Attestation Protocol
-
BMU08
-
[BMU08] Backes, M., Maffei, M., Unruh, D.: Zero-Knowledge in the Applied Picalculus and Automated Verification of the Direct Anonymous Attestation Protocol. In: IEEE Symposium on Security and Privacy, pp. 202-215 (2008)
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 202-215
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
5
-
-
76549118061
-
A Dolev-Yao model for Zero Knowledge
-
BRS09
-
[BRS09] Baskar, A., Ramanujam, R., Suresh, S.P.: A Dolev-Yao model for Zero Knowledge. CMI Technical Report (2009), http://www.cmi.ac.in/~spsuresh/ content/pdffiles/zero-know-jun09.pdf
-
(2009)
CMI Technical Report
-
-
Baskar, A.1
Ramanujam, R.2
Suresh, S.P.3
-
7
-
-
31744441853
-
A survey of algebraic properties used in cryptographic protocols
-
CDL06
-
[CDL06] Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1), 1-43 (2006)
-
(2006)
Journal of Computer Security
, vol.14
, Issue.1
, pp. 1-43
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
8
-
-
84962447835
-
Computationally sound symbolic secrecy in the presence of hash functions
-
CKKW06, Arun-Kumar, S, Garg, N, eds, FSTTCS 2006, Springer, Heidelberg
-
[CKKW06] Cortier, V., Kremer, S., Küsters, R., Warinschi, B.: Computationally sound symbolic secrecy in the presence of hash functions. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 176-187. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4337
, pp. 176-187
-
-
Cortier, V.1
Kremer, S.2
Küsters, R.3
Warinschi, B.4
-
10
-
-
0042467908
-
-
[CLS03] Comon-Lundh, H., Shmatikov, V.: Intruder Deductions, Constraint Solving and Insecurity Decisions in Presence of Exclusive or. In: Proceedings of the 18th IEEE Synposium on Logic in Computer Science (LICS), June 2003, pp. 271-280 (2003)
-
[CLS03] Comon-Lundh, H., Shmatikov, V.: Intruder Deductions, Constraint Solving and Insecurity Decisions in Presence of Exclusive or. In: Proceedings of the 18th IEEE Synposium on Logic in Computer Science (LICS), June 2003, pp. 271-280 (2003)
-
-
-
-
11
-
-
48949088211
-
-
[Cre08] Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, 5123, pp. 414-418. Springer, Heidelberg (2008)
-
[Cre08] Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
-
-
-
-
12
-
-
68249084846
-
Verifying privacy-type properties of electronic voting protocols
-
DKR09
-
[DKR09] Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security 17(4), 435-487 (2009)
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 435-487
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
13
-
-
0003297091
-
Proofs and Types
-
GLT89, Cambridge University Press, Cambridge
-
[GLT89] Girard, J.-Y., Lafont, Y., Taylor, P.: Proofs and Types. Cambridge Tracts in Theoretical Computer Science, vol. 7. Cambridge University Press, Cambridge (1989)
-
(1989)
Cambridge Tracts in Theoretical Computer Science
, vol.7
-
-
Girard, J.-Y.1
Lafont, Y.2
Taylor, P.3
-
14
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
GMR89
-
[GMR89] Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal of Computing 18(1), 186-208 (1989)
-
(1989)
SIAM Journal of Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
15
-
-
18544364489
-
A computational interpretation of dolev-yao adversaries
-
Her05
-
[Her05] Herzog, J.: A computational interpretation of dolev-yao adversaries. Theoretical Computer Science 340(1), 57-81 (2005)
-
(2005)
Theoretical Computer Science
, vol.340
, Issue.1
, pp. 57-81
-
-
Herzog, J.1
-
16
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public key protocol using FDR
-
Low96, Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
-
[Low96] Lowe, G.: Breaking and fixing the Needham-Schroeder public key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
18
-
-
11944251803
-
Decidability of context-explicit security protocols
-
RS05
-
[RS05] Ramanujam, R., Suresh, S.P.: Decidability of context-explicit security protocols. Journal of Computer Security 13(1), 135-165 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 135-165
-
-
Ramanujam, R.1
Suresh, S.P.2
-
19
-
-
33751045375
-
A (restricted) quantifier elimination for security protocols
-
RS06
-
[RS06] Ramanujam, R., Suresh, S.P.: A (restricted) quantifier elimination for security protocols. Theoretical Computer Science 367, 228-256 (2006)
-
(2006)
Theoretical Computer Science
, vol.367
, pp. 228-256
-
-
Ramanujam, R.1
Suresh, S.P.2
-
20
-
-
0037453396
-
Protocol Insecurity with Finite Number of Sessions and Composed Keys is NP-complete
-
RT03
-
[RT03] Rusinowitch, M., Turuani, M.: Protocol Insecurity with Finite Number of Sessions and Composed Keys is NP-complete. Theoretical Computer Science 299, 451-475 (2003)
-
(2003)
Theoretical Computer Science
, vol.299
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
|