메뉴 건너뛰기




Volumn 6841 LNCS, Issue , 2011, Pages 71-90

Computer-aided security proofs for the working cryptographer

Author keywords

Cramer Shoup cryptosystem; ElGamal encryption; game based proofs; Provable security; verifiable security

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 80051978821     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22792-9_5     Document Type: Conference Paper
Times cited : (201)

References (24)
  • 4
    • 67650675340 scopus 로고    scopus 로고
    • Formal certification of ElGamal encryption. A gentle introduction to CertiCrypt
    • Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. Springer, Heidelberg
    • Barthe, G., Grégoire, B., Heraud, S., Zanella Béguelin, S.: Formal certification of ElGamal encryption. A gentle introduction to CertiCrypt. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 1-19. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5491 , pp. 1-19
    • Barthe, G.1    Grégoire, B.2    Heraud, S.3    Zanella Béguelin, S.4
  • 5
    • 79951804314 scopus 로고    scopus 로고
    • Beyond provable security verifiable IND-CCA security of OAEP
    • Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
    • Barthe, G., Grégoire, B., Lakhnech, Y., Zanella Béguelin, S.: Beyond provable security verifiable IND-CCA security of OAEP. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 180-196. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6558 , pp. 180-196
    • Barthe, G.1    Grégoire, B.2    Lakhnech, Y.3    Zanella Béguelin, S.4
  • 8
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 11
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • IEEE Computer Society, Los Alamitos
    • Blanchet, B.: A computationally sound mechanized prover for security protocols. In: 27th IEEE Symposium on Security and Privacy, S&P 2006, pp. 140-154. IEEE Computer Society, Los Alamitos (2006)
    • (2006) 27th IEEE Symposium on Security and Privacy, S&P 2006 , pp. 140-154
    • Blanchet, B.1
  • 12
    • 33749579704 scopus 로고    scopus 로고
    • Automated security proofs with sequences of games
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Blanchet, B., Pointcheval, D.: Automated security proofs with sequences of games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 537-554. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 537-554
    • Blanchet, B.1    Pointcheval, D.2
  • 14
    • 48949088211 scopus 로고    scopus 로고
    • The scyther tool: Verification, falsification, and analysis of security protocols
    • Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
    • Cremers, C.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5123 , pp. 414-418
    • Cremers, C.1
  • 17
    • 33746336609 scopus 로고    scopus 로고
    • A plausible approach to computer-aided cryptographic proofs
    • EPrint Archive, Report 2005/181
    • Halevi, S.: A plausible approach to computer-aided cryptographic proofs. Cryptology ePrint Archive, Report 2005/181 (2005)
    • (2005) Cryptology
    • Halevi, S.1
  • 18
    • 0005411712 scopus 로고    scopus 로고
    • Probabilistic extensions of process algebras
    • Bergstra, J., Ponse, A., Smolka, S. (eds.) Elsevier, Amsterdam
    • Jonsson, B., Yi, W., Larsen, K.G.: Probabilistic extensions of process algebras. In: Bergstra, J., Ponse, A., Smolka, S. (eds.) Handbook of Process Algebra, pp. 685-710. Elsevier, Amsterdam (2001)
    • (2001) Handbook of Process Algebra , pp. 685-710
    • Jonsson, B.1    Yi, W.2    Larsen, K.G.3
  • 19
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L.C.: The inductive approach to verifying cryptographic protocols. J. of Comput. Secur. 6(1-2), 85-128 (1998)
    • (1998) J. of Comput. Secur. , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 20
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • ePrint Archive, Report 2004/332
    • Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004)
    • (2004) Cryptology
    • Shoup, V.1
  • 21
    • 58149385191 scopus 로고    scopus 로고
    • Proof checking technology for satisfiability modulo theories
    • Stump, A.: Proof checking technology for satisfiability modulo theories. Electr. Notes Theor. Comput. Sci. 228, 121-133 (2009)
    • (2009) Electr. Notes Theor. Comput. Sci. , vol.228 , pp. 121-133
    • Stump, A.1
  • 22
    • 57049139521 scopus 로고    scopus 로고
    • The Coq development team Version 8.3
    • The Coq development team: The Coq Proof Assistant Reference Manual Version 8.3 (2010), http://coq.inria.fr
    • (2010) The Coq Proof Assistant Reference Manual


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.