-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
70349233792
-
Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single sign-on for google apps
-
A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. T. Abad. Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single sign-on for google apps. In Proceedings f the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008), pages 1-10, 2008.
-
(2008)
Proceedings F the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008)
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Abad, L.T.5
-
3
-
-
74049100112
-
Cosp: A general framework for computational soundness proofs
-
November Preprint on IACR ePrint 2009/080
-
M. Backes, D. Hofheinz, and D. Unruh. Cosp: A general framework for computational soundness proofs. In ACM CCS 2009, pages 66-78, November 2009. Preprint on IACR ePrint 2009/080.
-
(2009)
ACM CCS 2009
, pp. 66-78
-
-
Backes, M.1
Hofheinz, D.2
Unruh, D.3
-
6
-
-
51749088371
-
Computational soundness of symbolic zero-knowledge proofs against active attackers
-
Pittsburgh, PA, USA, June IEEE Computer Society Press
-
M. Backes and D. Unruh. Computational soundness of symbolic zero-knowledge proofs against active attackers. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 255-269, Pittsburgh, PA, USA, June 2008. IEEE Computer Society Press.
-
(2008)
Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08)
, pp. 255-269
-
-
Backes, M.1
Unruh, D.2
-
8
-
-
33745528593
-
Universally composable symbolic analysis of mutual authentication and key-exchange protocols
-
DOI 10.1007/11681878-20, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
R. Canetti and J. Herzog. Universally composable symbolic analysis of mutual authentication and key-exchange protocols (extended abstract). In Proc. 3rd Theory of Cryptography Conference (TCC'06), volume 3876 of LNCS, pages 380-403. Springer, 2006. (Pubitemid 43979859)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS3876
, pp. 380-403
-
-
Canetti, R.1
Herzog, J.2
-
11
-
-
84962447835
-
Computationally sound symbolic secrecy in the presence of hash functions
-
Kolkata, India Springer
-
V. Cortier, S. Kremer, R. Küsters, and B. Warinschi. Computationally sound symbolic secrecy in the presence of hash functions. In Proceedings of the 26th Conference on Fundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of LNCS, pages 176-187, Kolkata, India, 2006. Springer.
-
(2006)
Proceedings of the 26th Conference on Fundations of Software Technology and Theoretical Computer Science (FSTTCS'06), Volume 4337 of LNCS
, pp. 176-187
-
-
Cortier, V.1
Kremer, S.2
Küsters, R.3
Warinschi, B.4
-
12
-
-
79956129556
-
A survey of symbolic methods in computational analysis of cryptographic systems
-
V. Cortier, S. Kremer, and B. Warinschi. A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning, 46(3-4):225-259, 2011.
-
(2011)
J. Autom. Reasoning
, vol.46
, Issue.3-4
, pp. 225-259
-
-
Cortier, V.1
Kremer, S.2
Warinschi, B.3
-
13
-
-
24644437051
-
Computationally sound, automated proofs for security protocols
-
Programming Languages and Systems - 14th European Symposium on Programming, ESOP 2005, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proceedings
-
V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols. In European Symposium on Programming (ESOP'05), volume 3444 of LNCS, pages 157-171, Edinburgh, UK, 2005. Springer. (Pubitemid 41274056)
-
(2005)
Lecture Notes in Computer Science
, vol.3444
, pp. 157-171
-
-
Cortier, V.1
Warinschi, B.2
-
15
-
-
18544364489
-
A computational interpretation of Dolev-Yao adversaries
-
DOI 10.1016/j.tcs.2005.03.003, PII S0304397505001179, Theoretical Foundations of Security Analysis and Design II
-
J. Herzog. A computational interpretation of Dolev-Yao adversaries. Theoretical C om puter Science, 340:57-81, June 2005. (Pubitemid 40654648)
-
(2005)
Theoretical Computer Science
, vol.340
, Issue.1
, pp. 57-81
-
-
Herzog, J.1
-
16
-
-
24644476184
-
Completing the picture: Soundness of formal encryption in the presence of active adversaries
-
Programming Languages and Systems - 14th European Symposium on Programming, ESOP 2005, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proceedings
-
R. Janvier, Y. Lakhnech, and L. Mazaré. Completing the picture: Soundness of formal encryption in the presence of active adversaries. In European Symposium on Programming (ESOP'05), volume 3444 of LNCS, pages 172-185. Springer, 2005. (Pubitemid 41274057)
-
(2005)
Lecture Notes in Computer Science
, vol.3444
, pp. 172-185
-
-
Janvier, R.1
Lakhnech, Y.2
Mazare, L.3
-
17
-
-
34347205954
-
Computational soundness of symbolic analysis for protocols using hash functions
-
Timisoara, Romania, Sept. Elsevier Science Publishers
-
R. Janvier, Y. Lakhnech, and L. Mazaré. Computational soundness of symbolic analysis for protocols using hash functions. In Proceedings of the Workshop on Information and Computer Security (ICS'06), Electronic Notes in Theoretical Computer Science, Timisoara, Romania, Sept. 2006. Elsevier Science Publishers.
-
(2006)
Proceedings of the Workshop on Information and Computer Security (ICS'06), Electronic Notes in Theoretical Computer Science
-
-
Janvier, R.1
Lakhnech, Y.2
Mazaré, L.3
-
18
-
-
74049097469
-
Computational soundness for key exchange protocols with symmetric encryption
-
E. Al-Shaer, S. Jha, and A. D. Keromytis, editors ACM Press
-
R. Küsters and M. Tuengerthal. Computational Soundness for Key Exchange Protocols with Symmetric Encryption. In E. Al-Shaer, S. Jha, and A. D. Keromytis, editors, Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pages 91-100. ACM Press, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009)
, pp. 91-100
-
-
Küsters, R.1
Tuengerthal, M.2
-
19
-
-
0342658605
-
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), volume 1055 of LNCS, pages 147-166. Springer-Verlag, March 1996. (Pubitemid 126050413)
-
(1996)
Lecture Notes in Computer Science
, Issue.1055
, pp. 147-166
-
-
Lowe, G.1
|