메뉴 건너뛰기




Volumn , Issue , 2011, Pages 63-74

A composable computational soundness notion

Author keywords

Composability; Computational soundness

Indexed keywords

ASYMMETRIC ENCRYPTION; COMPOSABILITY; COMPUTATIONAL ADVERSARIES; COMPUTATIONAL SECURITY; COMPUTATIONAL SOUNDNESS; CRYPTOGRAPHIC PRIMITIVES; MODULAR EXTENSION; PROTOCOL SPECIFICATIONS;

EID: 80755169513     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046717     Document Type: Conference Paper
Times cited : (17)

References (20)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 74049100112 scopus 로고    scopus 로고
    • Cosp: A general framework for computational soundness proofs
    • November Preprint on IACR ePrint 2009/080
    • M. Backes, D. Hofheinz, and D. Unruh. Cosp: A general framework for computational soundness proofs. In ACM CCS 2009, pages 66-78, November 2009. Preprint on IACR ePrint 2009/080.
    • (2009) ACM CCS 2009 , pp. 66-78
    • Backes, M.1    Hofheinz, D.2    Unruh, D.3
  • 6
    • 51749088371 scopus 로고    scopus 로고
    • Computational soundness of symbolic zero-knowledge proofs against active attackers
    • Pittsburgh, PA, USA, June IEEE Computer Society Press
    • M. Backes and D. Unruh. Computational soundness of symbolic zero-knowledge proofs against active attackers. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 255-269, Pittsburgh, PA, USA, June 2008. IEEE Computer Society Press.
    • (2008) Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08) , pp. 255-269
    • Backes, M.1    Unruh, D.2
  • 12
    • 79956129556 scopus 로고    scopus 로고
    • A survey of symbolic methods in computational analysis of cryptographic systems
    • V. Cortier, S. Kremer, and B. Warinschi. A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning, 46(3-4):225-259, 2011.
    • (2011) J. Autom. Reasoning , vol.46 , Issue.3-4 , pp. 225-259
    • Cortier, V.1    Kremer, S.2    Warinschi, B.3
  • 13
    • 24644437051 scopus 로고    scopus 로고
    • Computationally sound, automated proofs for security protocols
    • Programming Languages and Systems - 14th European Symposium on Programming, ESOP 2005, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proceedings
    • V. Cortier and B. Warinschi. Computationally sound, automated proofs for security protocols. In European Symposium on Programming (ESOP'05), volume 3444 of LNCS, pages 157-171, Edinburgh, UK, 2005. Springer. (Pubitemid 41274056)
    • (2005) Lecture Notes in Computer Science , vol.3444 , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 15
    • 18544364489 scopus 로고    scopus 로고
    • A computational interpretation of Dolev-Yao adversaries
    • DOI 10.1016/j.tcs.2005.03.003, PII S0304397505001179, Theoretical Foundations of Security Analysis and Design II
    • J. Herzog. A computational interpretation of Dolev-Yao adversaries. Theoretical C om puter Science, 340:57-81, June 2005. (Pubitemid 40654648)
    • (2005) Theoretical Computer Science , vol.340 , Issue.1 , pp. 57-81
    • Herzog, J.1
  • 16
    • 24644476184 scopus 로고    scopus 로고
    • Completing the picture: Soundness of formal encryption in the presence of active adversaries
    • Programming Languages and Systems - 14th European Symposium on Programming, ESOP 2005, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proceedings
    • R. Janvier, Y. Lakhnech, and L. Mazaré. Completing the picture: Soundness of formal encryption in the presence of active adversaries. In European Symposium on Programming (ESOP'05), volume 3444 of LNCS, pages 172-185. Springer, 2005. (Pubitemid 41274057)
    • (2005) Lecture Notes in Computer Science , vol.3444 , pp. 172-185
    • Janvier, R.1    Lakhnech, Y.2    Mazare, L.3
  • 19
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), volume 1055 of LNCS, pages 147-166. Springer-Verlag, March 1996. (Pubitemid 126050413)
    • (1996) Lecture Notes in Computer Science , Issue.1055 , pp. 147-166
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.