-
1
-
-
78449234832
-
Certifying assembly with formal cryptographic proofs: The case of BBS
-
Affeldt, R., Nowak, D., Yamada, K.: Certifying assembly with formal cryptographic proofs: the case of BBS. In: Proceedings of the 9th International Workshop on Automated Verification of Critical Systems, AVoCS 2009 (2009)
-
(2009)
Proceedings of the 9th International Workshop on Automated Verification of Critical Systems, AVoCS 2009
-
-
Affeldt, R.1
Nowak, D.2
Yamada, K.3
-
2
-
-
58049108667
-
A formal language for cryptographic pseudocode
-
Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. Springer, Heidelberg
-
Backes, M., Berg, M., Unruh, D.: A formal language for cryptographic pseudocode. In: Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. LNCS (LNAI), vol. 5330, pp. 353-376. Springer, Heidelberg (2008)
-
(2008)
LNCS (LNAI)
, vol.5330
, pp. 353-376
-
-
Backes, M.1
Berg, M.2
Unruh, D.3
-
3
-
-
70350323754
-
Formal certification of code-based cryptographic proofs
-
ACM Press, New York
-
Barthe, G., Grégoire, B., Zanella Béguelin, S.: Formal certification of code-based cryptographic proofs. In: Proceedings of the 36th ACM SIGPLAN- SIGACT Symposium on Principles of Programming Languages (POPL 2009), pp. 90-101. ACM Press, New York (2009)
-
(2009)
Proceedings of the 36th ACM SIGPLAN- SIGACT Symposium on Principles of Programming Languages (POPL 2009)
, pp. 90-101
-
-
Barthe, G.1
Grégoire, B.2
Zanella Béguelin, S.3
-
4
-
-
0002602593
-
A new recursion-theoretic characterization of the polytime functions
-
Bellantoni, S., Cook, S.A.: A new recursion-theoretic characterization of the polytime functions. In: Computational Complexity, vol. 2, pp. 97-110 (1992)
-
(1992)
Computational Complexity
, vol.2
, pp. 97-110
-
-
Bellantoni, S.1
Cook, S.A.2
-
5
-
-
51249085821
-
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
-
Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Journal of Cryptology 21, 469-491 (2008)
-
(2008)
Journal of Cryptology
, vol.21
, pp. 469-491
-
-
Bellare, M.1
Namprempre, C.2
-
6
-
-
33749579704
-
Automated security proofs with sequences of games
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Blanchet, B., Pointcheval, D.: Automated security proofs with sequences of games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 537-554. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 537-554
-
-
Blanchet, B.1
Pointcheval, D.2
-
7
-
-
0022716288
-
A simple unpredictable pseudo random number generator
-
Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo random number generator. SIAM Journal on Computing. Society for Industrial and Applied Mathematics 15(2), 364-383 (1986)
-
(1986)
SIAM Journal on Computing. Society for Industrial and Applied Mathematics
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
8
-
-
84947778144
-
The Decision Diffie-Hellman problem
-
Buhler, J.P. (ed.) ANTS 1998. Springer, Heidelberg
-
Boneh, D.: The Decision Diffie-Hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48-83. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1423
, pp. 48-83
-
-
Boneh, D.1
-
9
-
-
38149024828
-
Code-based game-playing proofs and the security of triple encryption
-
Report 2004/331
-
Bellare, M., Rogaway, P.: Code-based game-playing proofs and the security of triple encryption. Cryptology ePrint Archive, Report 2004/331 (2004)
-
(2004)
Cryptology EPrint Archive
-
-
Bellare, M.1
Rogaway, P.2
-
10
-
-
33746332058
-
A probabilistic Hoare-style logic for game-based cryptographic proofs
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
-
Corin, R., den Hartog, J.: A probabilistic Hoare-style logic for game-based cryptographic proofs. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 252-263. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 252-263
-
-
Corin, R.1
Den Hartog, J.2
-
11
-
-
70349275452
-
Towards automated proofs for asymmetric encryption schemes in the random oracle model
-
ACM Press, New York
-
Courant, J., Daubignard, M., Ene, C., Lafourcade, P., Lakhnech, Y.: Towards automated proofs for asymmetric encryption schemes in the random oracle model. In: Proceedings of the 15th ACM Conference Computer and Communications Security, CCS 2008, pp. 371-380. ACM Press, New York (2008)
-
(2008)
Proceedings of the 15th ACM Conference Computer and Communications Security, CCS 2008
, pp. 371-380
-
-
Courant, J.1
Daubignard, M.2
Ene, C.3
Lafourcade, P.4
Lakhnech, Y.5
-
13
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469-472 (1985)
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
15
-
-
0021409284
-
Probabilistic encryption
-
An earlier version appeared in proceedings of STOC
-
Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences (JCSS) 28(2), 270-299 (1984) (An earlier version appeared in proceedings of STOC 1982)
-
(1982)
Journal of Computer and System Sciences (JCSS)
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
16
-
-
84957704802
-
A Mixed Modal/Linear Lambda Calculus with Applications to Bellantoni-Cook Safe Recursion
-
Nielsen, M. (ed.) CSL 1997. Springer, Heidelberg
-
Hofmann, M.: A Mixed Modal/Linear Lambda Calculus with Applications to Bellantoni-Cook Safe Recursion. In: Nielsen, M. (ed.) CSL 1997. LNCS, vol. 1414, pp. 275-294. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1414
, pp. 275-294
-
-
Hofmann, M.1
-
17
-
-
0000201517
-
Safe recursion with higher types and BCK-algebra
-
104
-
Hofmann, M.: Safe recursion with higher types and BCK-algebra. In: Annals of Pure and Applied Logic, vol. 1414, 104(1-3), pp. 113-166 (2000)
-
(2000)
Annals of Pure and Applied Logic
, vol.1414
, Issue.1-3
, pp. 113-166
-
-
Hofmann, M.1
-
18
-
-
84945267622
-
A formal approach to probabilistic termination
-
Carreño, V.A., Muñoz, C.A., Tahar, S. (eds.) TPHOLs 2002. Springer, Heidelberg
-
Hurd, J.: A formal approach to probabilistic termination. In: Carreño, V.A., Muñoz, C.A., Tahar, S. (eds.) TPHOLs 2002. LNCS, vol. 2410, pp. 230-245. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2410
, pp. 230-245
-
-
Hurd, J.1
-
20
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
21
-
-
0032307051
-
A linguistic characterization of bounded oracle computation and probabilistic polynomial time
-
Mitchell, J.C., Mitchell, M., Scedrov, A.: A linguistic characterization of bounded oracle computation and probabilistic polynomial time. In: Proceedings of the 39th Annual Symposium on Foundations of Computer Science (FOCS 1998), pp. 725-733 (1998)
-
(1998)
Proceedings of the 39th Annual Symposium on Foundations of Computer Science (FOCS 1998)
, pp. 725-733
-
-
Mitchell, J.C.1
Mitchell, M.2
Scedrov, A.3
-
22
-
-
33244491452
-
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
-
Mitchell, J.C., Ramanathan, A., Scedrov, A., Teague, V.: A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theoretical Computer Science 353(1-3), 118-164 (2006)
-
(2006)
Theoretical Computer Science
, vol.353
, Issue.1-3
, pp. 118-164
-
-
Mitchell, J.C.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
23
-
-
0026188821
-
Notions of computation and monads
-
Moggi, E.: Notions of computation and monads. Information and Computation 93(1), 55-92 (1991)
-
(1991)
Information and Computation
, vol.93
, Issue.1
, pp. 55-92
-
-
Moggi, E.1
-
24
-
-
38148999450
-
A framework for game-based security proofs
-
Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. Springer, Heidelberg
-
Nowak, D.: A framework for game-based security proofs. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 319-333. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4861
, pp. 319-333
-
-
Nowak, D.1
-
25
-
-
67049117699
-
On formal verification of arithmetic-based cryptographic primitives
-
Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
-
Nowak, D.: On formal verification of arithmetic-based cryptographic primitives. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 368-382. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 368-382
-
-
Nowak, D.1
-
27
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
Report 2004/332
-
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004)
-
(2004)
Cryptology EPrint Archive
-
-
Shoup, V.1
-
29
-
-
70350277480
-
The Computational SLR: A Logic for Reasoning about Computational Indistinguishability
-
Curien, P.-L. (ed.) TLCA 2009. Springer, Heidelberg
-
Zhang, Y.: The Computational SLR: A Logic for Reasoning about Computational Indistinguishability. In: Curien, P.-L. (ed.) TLCA 2009. LNCS, vol. 5608, pp. 401-415. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5608
, pp. 401-415
-
-
Zhang, Y.1
|