-
1
-
-
33745790245
-
Guessing attacks and the computational soundness of static equivalence
-
Proc. 9th International Conference on Foundations of Software Science and ComputationStructures (FOSSACS). Springer
-
M. Abadi, M. Baudet, and B. Warinschi. Guessing attacks and the computational soundness of static equivalence. In Proc. 9th International Conference on Foundations of Software Science and ComputationStructures (FOSSACS), volume 3921 of Lecture Notes in Computer Science, pages 398-412. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3921
, pp. 398-412
-
-
Abadi, M.1
Baudet, M.2
Warinschi, B.3
-
2
-
-
17644411480
-
Mobile values, new names, and secure communication
-
New York, NY, USA. ACM Press
-
Martín Abadi and Cédric Fournet. Mobile values, new names, and secure communication. In POPL '01: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 104-115, New York, NY, USA, 2001. ACM Press.
-
(2001)
POPL '01: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
5
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Martín Abadi and Phillip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
6
-
-
33746364838
-
Cryptographically sound implementations for communicating processes
-
Pedro Adão and Cédric Fournet. Cryptographically sound implementations for communicating processes. In Proc. ICALP, pages 83-94, 2006.
-
(2006)
Proc. ICALP
, pp. 83-94
-
-
Adão, P.1
Fournet, C.2
-
7
-
-
74049100112
-
CoSP: A general framework for computational soundness proofs
-
ACM Press, November 2009. Full version on IACR ePrint 2009/080. Some of the definitions we use only occur in the full version
-
Michael Backes, Dennis Hofheinz, and Dominique Unruh. CoSP: A general framework for computational soundness proofs. In ACM CCS 2009, pages 66-78. ACM Press, November 2009. Full version on IACR ePrint 2009/080. Some of the definitions we use only occur in the full version.
-
(2009)
ACM CCS
, pp. 66-78
-
-
Backes, M.1
Hofheinz, D.2
Unruh, D.3
-
11
-
-
1442292329
-
A composable cryptographic library with nested operations (extended abstract)
-
Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003
-
Michael Backes, Birgit Pfitzmann, and Michael Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
12
-
-
0142250274
-
Symmetric authentication within a simulatable cryptographic library
-
Proc. 8th European Symposium on Research in Computer Security (ESORICS). Springer
-
Michael Backes, Birgit Pfitzmann, and Michael Waidner. Symmetric authentication within a simulatable cryptographic library. In Proc. 8th European Symposium on Research in Computer Security (ESORICS), volume 2808 of Lecture Notes in Computer Science, pages 271-290. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2808
, pp. 271-290
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
13
-
-
84855205195
-
The reactive simulatability (RSIM) framework for asynchronous systems
-
Michael Backes, Birgit Pfitzmann, and Michael Waidner. The reactive simulatability (RSIM) framework for asynchronous systems. Information and Computation, 205(12):1685-1720, 2007.
-
(2007)
Information and Computation
, vol.205
, Issue.12
, pp. 1685-1720
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
15
-
-
26444541858
-
Computationally sound implementations of equational theories against passive adversaries
-
Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP). Springer
-
M. Baudet, V. Cortier, and S. Kremer. Computationally sound implementations of equational theories against passive adversaries. In Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP), volume 580 of Lecture Notes in Computer Science, pages 652-663. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.580
, pp. 652-663
-
-
Baudet, M.1
Cortier, V.2
Kremer, S.3
-
16
-
-
51749098783
-
Refinement types for secure implementations
-
Full version is Microsoft Research technical report MSR-TR-2008-118
-
Jesper Bengtson, Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, and Sergio Maffeis. Refinement types for secure implementations. In Proc. 21st IEEE Security Foundations Symposium (CSF), pages 17-32, 2008. Full version is Microsoft Research technical report MSR-TR-2008-118.
-
(2008)
Proc. 21st IEEE Security Foundations Symposium (CSF)
, pp. 17-32
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.D.4
Maffeis, S.5
-
17
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
IEEE
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In Proc. 19th IEEE Computer Security Foundations Workshop (CSFW), pages 139-152. IEEE, 2006.
-
(2006)
Proc. 19th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 139-152
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
19
-
-
57849106656
-
Cryptographically verified implementations for TLS
-
ACM Press
-
Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, and Eugen Zǎlinescu. Cryptographically verified implementations for TLS. In 15th ACM Conference on Computer and Communications Security (CCS 2008), pages 459-468. ACM Press, 2008.
-
(2008)
15th ACM Conference on Computer and Communications Security (CCS 2008)
, pp. 459-468
-
-
Bhargavan, K.1
Corin, R.2
Fournet, C.3
Zǎlinescu, E.4
-
20
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society Press
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82-96. IEEE Computer Society Press, 2001.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 82-96
-
-
Blanchet, B.1
-
21
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
IEEE Computer Society. Extended version online available as IACR ePrint 2005/401
-
Bruno Blanchet. A computationally sound mechanized prover for security protocols. In IEEE Symposium on Security and Privacy, Proceedings of SSP 2006, pages 140-154. IEEE Computer Society, 2006. Extended version online available as IACR ePrint 2005/401.
-
(2006)
IEEE Symposium on Security and Privacy, Proceedings of SSP 2006
, pp. 140-154
-
-
Blanchet, B.1
-
23
-
-
78650013074
-
About models of securityprotocols (abstract)
-
Ramesh Hariharan, Madhavan Mukund, and V Vinay, editors, Dagstuhl, Germany. Schloss Dagstuhl.
-
Hubert Comon-Lundh. About models of securityprotocols (abstract). In Ramesh Hariharan, Madhavan Mukund, and V Vinay, editors, Proc. FSTTCS, Dagstuhl, Germany, 2008. Schloss Dagstuhl. http://drops.dagstuhl.de/opus/volltexte/2008/ 1766/.
-
(2008)
Proc. FSTTCS
-
-
Comon-Lundh, H.1
-
24
-
-
60549110127
-
Computational soundness of observational equivalence
-
Hubert Comon-Lundh and Véronique Cortier. Computational soundness of observational equivalence. In Proc. ACM CCS, pages 109-118, 2008.
-
(2008)
Proc. ACM CCS
, pp. 109-118
-
-
Comon-Lundh, H.1
Cortier, V.2
-
26
-
-
0020889144
-
On the security of multi-party ping-pong protocols
-
Shimon Even and Oded Goldreich. On the security of multi-party ping-pong protocols. In Proc. 24th IEEE FOCS, pages 34-39, 1983.
-
(1983)
Proc. 24th IEEE FOCS
, pp. 34-39
-
-
Even, S.1
Goldreich, O.2
-
28
-
-
24144470036
-
Cryptographic protocol analysis on real c code
-
Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05). Springer-Verlag
-
J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real c code. In Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of Lecture Notes in Computer Science, pages 363-379. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3385
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
29
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
Springer
-
Jean Goubault-Larrecq and Fabrice Parrennes. Cryptographic protocol analysis on real C code. In 6th International Conference on Verification, Model Checking, and Abstract Interpretation, (VMCAI 2005), pages 363-379. Springer, 2005.
-
(2005)
6th International Conference on Verification, Model Checking, and Abstract Interpretation, (VMCAI 2005)
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
31
-
-
35248848005
-
Plaintext awareness via key registration
-
Advances in Cryptology: CRYPTO 2003. Springer
-
Jonathan Herzog, Moses Liskov, and Silvio Micali. Plaintext awareness via key registration. In Advances in Cryptology: CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 548-564. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 548-564
-
-
Herzog, J.1
Liskov, M.2
Micali, S.3
-
32
-
-
24644476184
-
Completing the picture: Soundness of formal encryption in the presence of active adversaries
-
Romain Janvier, Yassine Lakhnech, and Laurent Mazaré. Completing the picture: Soundness of formal encryption in the presence of active adversaries. In Proc. ESOP, pages 172-185, 2005.
-
(2005)
Proc. ESOP
, pp. 172-185
-
-
Janvier, R.1
Lakhnech, Y.2
Mazaré, L.3
-
33
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Richard Kemmerer, Catherine Meadows, and Jon Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, 1994.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
34
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
Peeter Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
-
(2001)
Proc. 10th European Symposium on Programming (ESOP)
, pp. 77-91
-
-
Laud, P.1
-
35
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
Peeter Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symposium on Security & Privacy, pages 71-85, 2004.
-
(2004)
Proc. 25th IEEE Symposium on Security & Privacy
, pp. 71-85
-
-
Laud, P.1
-
36
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS). Springer
-
Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
37
-
-
0004256761
-
-
PhD thesis, Georgia Institute of Technology
-
Michael Merritt. Cryptographic Protocols. PhD thesis, Georgia Institute of Technology, 1983.
-
(1983)
Cryptographic Protocols
-
-
Merritt, M.1
-
38
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Proc. 1st Theory of Cryptography Conference (TCC). Springer
-
Daniele Micciancio and Bogdan Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 2951 of Lecture Notes in Computer Science, pages 133-151. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
39
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Lawrence Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85-128, 1998.
-
(1998)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.1
-
41
-
-
33947656534
-
Cryptographically sound theorem proving
-
Christoph Sprenger, Michael Backes, David Basin, Birgit Pfitzmann, and Michael Waidner. Cryptographically sound theorem proving. In Proc. 19th IEEE Computer Security Foundations Workshop (CSFW), pages 153-166, 2006.
-
(2006)
Proc. 19th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 153-166
-
-
Sprenger, C.1
Backes, M.2
Basin, D.3
Pfitzmann, B.4
Waidner, M.5
|