-
1
-
-
33845921212
-
Computational secrecy by typing for the Pi calculus
-
Programming Languages and Systems - 4th Asian Symposium, APLAS 2006, Proceedings
-
Abadi, M., Corin, R., Fournet, C.: Computational secrecy by typing for the pi calculus. In: Kobayashi, N. (ed.) APLAS 2006. LNCS, vol. 4279, pp. 253-269. Springer, Heidelberg (2006) (Pubitemid 46030593)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4279 LNCS
, pp. 253-269
-
-
Abadi, M.1
Corin, R.2
Fournet, C.3
-
2
-
-
17644411480
-
Mobile values, new names, and secure communication
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL 2001, pp. 104-115 (2001)
-
(2001)
POPL 2001
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. Springer, Heidelberg
-
Abadi, M., Jürjens, J.: Formal eavesdropping and its computational interpretation. In: Kobayashi, N., Pierce, B.C. (eds.) TACS 2001. LNCS, vol. 2215, pp. 82-94. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
4
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology 15(2), 103-127 (2002)
-
(2002)
J. Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
5
-
-
58049108667
-
A formal language for cryptographic pseudocode
-
Cervesato, I., Veith, H., Voronkov, A. (eds) LPAR 2008. Springer, Heidelberg
-
Backes, M., Berg, M., Unruh, D.: A formal language for cryptographic pseudocode. In: Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. LNCS (LNAI), vol. 5330, pp. 353-376. Springer, Heidelberg (2008)
-
(2008)
LNCS (LNAI)
, vol.5330
, pp. 353-376
-
-
Backes, M.1
Berg, M.2
Unruh, D.3
-
6
-
-
34547340512
-
Computationally sound secrecy proofs by mechanized flow analysis
-
Backes, M., Laud, P.: Computationally sound secrecy proofs by mechanized flow analysis. In: ACM CCS 2006, pp. 370-379 (2006)
-
(2006)
ACM CCS 2006
, pp. 370-379
-
-
Backes, M.1
Laud, P.2
-
7
-
-
1442292329
-
A composable cryptographic library with nested operations
-
Backes, M., Pfitzmann, B., Waidner, M.: A composable cryptographic library with nested operations. In: ACM CCS 2003, pp. 220-230 (2003)
-
(2003)
ACM CCS 2003
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
8
-
-
0025444592
-
The program dependence web: A representation supporting control, data, and demand-driven interpretation of imperative languages
-
Ballance, R.A., Maccabe, A.B., Ottenstein, K.J.: The program dependence web: A representation supporting control, data, and demand-driven interpretation of imperative languages. In: PLDI 1990, pp. 257-271 (1990)
-
(1990)
PLDI 1990
, pp. 257-271
-
-
Ballance, R.A.1
Maccabe, A.B.2
Ottenstein, K.J.3
-
9
-
-
70350323754
-
Formal certification of code-based cryptographic proofs
-
Barthe, G., Grégoire, B., Béguelin, S.Z.: Formal certification of code-based cryptographic proofs. In: POPL 2009, pp. 90-101 (2009)
-
(2009)
POPL 2009
, pp. 90-101
-
-
Barthe, G.1
Grégoire, B.2
Béguelin, S.Z.3
-
10
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-535. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 531-535
-
-
Bellare, M.1
Namprempre, C.2
-
11
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
12
-
-
33749579009
-
A computationally sound mechanized prover for security protocols
-
Blanchet, B.: A computationally sound mechanized prover for security protocols. In: IEEE S&P 2006, pp. 140-154 (2006)
-
(2006)
IEEE S&P 2006
, pp. 140-154
-
-
Blanchet, B.1
-
13
-
-
77953261452
-
A Computationally Sound Mechanized Prover for Security Protocols
-
Report 2005/401 February 2
-
Blanchet, B.: A Computationally Sound Mechanized Prover for Security Protocols. Cryptology ePrint Archive, Report 2005/401 (February 2, 2007)
-
(2007)
Cryptology ePrint Archive
-
-
Blanchet, B.1
-
14
-
-
33746332058
-
A probabilistic hoare-style logic for game-based cryptographic proofs
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
-
Corin, R., den Hartog, J.: A probabilistic hoare-style logic for game-based cryptographic proofs. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 252-263. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 252-263
-
-
Corin, R.1
Den Hartog, J.2
-
15
-
-
84962447835
-
Computationally sound symbolic secrecy in the presence of hash functions
-
Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. Springer, Heidelberg
-
Cortier, V., Kremer, S., Küsters, R., Warinschi, B.: Computationally sound symbolic secrecy in the presence of hash functions. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 176-187. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4337
, pp. 176-187
-
-
Cortier, V.1
Kremer, S.2
Küsters, R.3
Warinschi, B.4
-
16
-
-
24644437051
-
Computationally sound, automated proofs for security protocols
-
Sagiv, M. (ed.) ESOP 2005. Springer, Heidelberg
-
Cortier, V., Warinschi, B.: Computationally sound, automated proofs for security protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 157-171. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3444
, pp. 157-171
-
-
Cortier, V.1
Warinschi, B.2
-
17
-
-
26444565771
-
Probabilistic polynomial-time semantics for a protocol security logic
-
Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. Springer, Heidelberg
-
Datta, A., Derek, A., Mitchell, J.C., Shmatikov, V., Turuani, M.: Probabilistic polynomial-time semantics for a protocol security logic. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 16-29. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 16-29
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Shmatikov, V.4
Turuani, M.5
-
18
-
-
33947704230
-
Computationally sound compositional logic for key exchange protocols
-
Datta, A., Derek, A., Mitchell, J.C., Warinschi, B.: Computationally sound compositional logic for key exchange protocols. In: CSFW 2006, pp. 321-334 (2006)
-
(2006)
CSFW 2006
, pp. 321-334
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Warinschi, B.4
-
19
-
-
0023385308
-
The program dependence graph and its use in optimization
-
Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst. 9(3), 319-349 (1987)
-
(1987)
ACM Trans. Program. Lang. Syst.
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
20
-
-
84865659111
-
Cryptographically sound implementations for typed information-flow security
-
Fournet, C., Rezk, T.: Cryptographically sound implementations for typed information-flow security. In: POPL 2008, pp. 323-335 (2008)
-
(2008)
POPL 2008
, pp. 323-335
-
-
Fournet, C.1
Rezk, T.2
-
21
-
-
33845661990
-
Demonstration of the interactive graph-visualization system vinci
-
Tamassia, R., Tollis, I.G. (eds.) GD 1994. Springer, Heidelberg
-
Fröhlich, M., Werner, M.: Demonstration of the interactive graph-visualization system vinci. In: Tamassia, R., Tollis, I.G. (eds.) GD 1994. LNCS, vol. 894, pp. 266-269. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.894
, pp. 266-269
-
-
Fröhlich, M.1
Werner, M.2
-
22
-
-
24644476184
-
Completing the picture: Soundness of formal encryption in the presence of active adversaries
-
Programming Languages and Systems - 14th European Symposium on Programming, ESOP 2005, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proceedings
-
Janvier, R., Lakhnech, Y., Mazaré, L.: Completing the picture: Soundness of formal encryption in the presence of active adversaries. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 172-185. Springer, Heidelberg (2005) (Pubitemid 41274057)
-
(2005)
Lecture Notes in Computer Science
, vol.3444
, pp. 172-185
-
-
Janvier, R.1
Lakhnech, Y.2
Mazare, L.3
-
23
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
Sands, D. (ed.) ESOP 2001. Springer, Heidelberg
-
Laud, P.: Semantics and program analysis of computationally secure information flow. In: Sands, D. (ed.) ESOP 2001. LNCS, vol. 2028, pp. 77-91. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2028
, pp. 77-91
-
-
Laud, P.1
-
24
-
-
35248840989
-
Handling encryption in an analysis for secure information flow
-
Degano, P. (ed.) ESOP 2003. Springer, Heidelberg
-
Laud, P.: Handling encryption in an analysis for secure information flow. In: Degano, P. (ed.) ESOP 2003. LNCS, vol. 2618, pp. 159-173. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
25
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
Laud, P.: Symmetric encryption in automatic analyses for confidentiality against active adversaries. In: IEEE S&P 2004, pp. 71-85 (2004)
-
(2004)
IEEE S&P 2004
, pp. 71-85
-
-
Laud, P.1
-
26
-
-
33745787443
-
Secrecy types for a simulatable cryptographic library
-
Laud, P.: Secrecy types for a simulatable cryptographic library. In: ACM CCS 2005, pp. 26-35 (2005)
-
(2005)
ACM CCS 2005
, pp. 26-35
-
-
Laud, P.1
-
27
-
-
26844509701
-
A type system for computationally secure information flow
-
Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. Springer, Heidelberg
-
Laud, P., Vene, V.: A type system for computationally secure information flow. In: Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, vol. 3623, pp. 365-377. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3623
, pp. 365-377
-
-
Laud, P.1
Vene, V.2
-
28
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
Lincoln, P., Mitchell, J.C., Mitchell, M., Scedrov, A.: A probabilistic poly-time framework for protocol analysis. In: ACM CCS 1998, pp. 112-121 (1998)
-
(1998)
ACM CCS 1998
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
29
-
-
35048899313
-
Soundness of Formal Encryption in the Presence of Active Adversaries
-
Theory of Cryptography First Theory of Cryptography Conference, TCC 2004 Cambridge, MA, USA, February 19-21, 2004 Proceedings
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004) (Pubitemid 38236623)
-
(2004)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
30
-
-
38148999450
-
A framework for game-based security proofs
-
Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. Springer, Heidelberg
-
Nowak, D.: A framework for game-based security proofs. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 319-333. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4861
, pp. 319-333
-
-
Nowak, D.1
-
31
-
-
84984058313
-
Dependence flow graphs: An algebraic approach to program dependencies
-
Pingali, K., Beck, M., Johnson, R., Moudgill, M., Stodghill, P.: Dependence flow graphs: An algebraic approach to program dependencies. In: POPL 1991, pp. 67-78 (1991)
-
(1991)
POPL 1991
, pp. 67-78
-
-
Pingali, K.1
Beck, M.2
Johnson, R.3
Moudgill, M.4
Stodghill, P.5
-
32
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
Report 2004/332
-
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004), http://eprint.iacr. org/
-
(2004)
Cryptology ePrint Archive
-
-
Shoup, V.1
-
33
-
-
34547244658
-
Secure information flow with random assignment and encryption
-
Smith, G.: Secure information flow with random assignment and encryption. In: FMSE 2006, pp. 33-44 (2006)
-
(2006)
FMSE 2006
, pp. 33-44
-
-
Smith, G.1
-
34
-
-
33947656534
-
Cryptographically sound theorem proving
-
Sprenger, C., Backes, M., Basin, D.A., Pfitzmann, B., Waidner, M.: Cryptographically sound theorem proving. In: CSFW 2006, pp. 153-166 (2006)
-
(2006)
CSFW 2006
, pp. 153-166
-
-
Sprenger, C.1
Backes, M.2
Basin, D.A.3
Pfitzmann, B.4
Waidner, M.5
-
35
-
-
51749114905
-
Cryptographically-sound protocol-model abstractions
-
Sprenger, C., Basin, D.A.: Cryptographically-sound protocol-model abstractions. In: CSF 2008, pp. 115-129 (2008)
-
(2008)
CSF 2008
, pp. 115-129
-
-
Sprenger, C.1
Basin, D.A.2
-
37
-
-
41549155487
-
Application of dependency graphs to security protocol analysis
-
Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. Springer, Heidelberg
-
Tšahhirov, I., Laud, P.: Application of dependency graphs to security protocol analysis. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol. 4912, pp. 294-311. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4912
, pp. 294-311
-
-
Tšahhirov, I.1
Laud, P.2
-
38
-
-
77953265389
-
-
uDraw(Graph) graph visualizer (2005), http://www.informatik.uni-bremen. de/uDrawGraph/en/index.html
-
(2005)
UDraw(Graph) Graph Visualizer
-
-
-
39
-
-
0033683194
-
Secure introduction of one-way functions
-
Volpano, D.M.: Secure introduction of one-way functions. In: CSFW 2000, pp. 246-254 (2000)
-
(2000)
CSFW 2000
, pp. 246-254
-
-
Volpano, D.M.1
|