메뉴 건너뛰기




Volumn , Issue , 2008, Pages 337-348

On the computational soundness of cryptographically masked flows

Author keywords

computational soundness; cryptographically masked flows; encryption; secure information flow

Indexed keywords

ABSTRACT MODELS; ANALYSIS TOOLS; COMPUTATIONAL SECURITY; COMPUTATIONAL SOUNDNESS; CRYPTOGRAPHIC OPERATIONS; CRYPTOGRAPHICALLY MASKED FLOWS; ERROR PRONES; EXECUTION MODEL; NON INTERFERENCE; PROGRAM STATE; SECURE INFORMATION FLOW; SECURITY DEFINITIONS;

EID: 84865660260     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1328438.1328479     Document Type: Conference Paper
Times cited : (19)

References (32)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by Typing in Security Protocols
    • September
    • Martín Abadi. Secrecy by Typing in Security Protocols. Journal of the ACM, 46(5):749-786, September 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 84978977131 scopus 로고    scopus 로고
    • Formal Eavesdropping and Its Computational Interpretation
    • Naoki Kobayashi and Benjamin C. Pierce, editors, Theoretical Aspects of Computer Software, 4th International Symposium, TACS 2001, Sendai, Japan, October Springer-Verlag
    • Martín Abadi and Jan Jürjens. Formal Eavesdropping and Its Computational Interpretation. In Naoki Kobayashi and Benjamin C. Pierce, editors, Theoretical Aspects of Computer Software, 4th International Symposium, TACS 2001, volume 2215 of LNCS, pages 82-94, Sendai, Japan, October 2001. Springer-Verlag.
    • (2001) LNCS , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 3
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
    • Jan van Leeuwen, Osamu Watanabe, Masami Hagiya, Peter D. Mosses, and Takayasu Ito, editors, International Conference IFIP TCS 2000, Sendai, Japan, August. Springer-Verlag
    • Martín Abadi and Phillip Rogaway. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). In Jan van Leeuwen, Osamu Watanabe, Masami Hagiya, Peter D. Mosses, and Takayasu Ito, editors, International Conference IFIP TCS 2000, volume 1872 of LNCS, pages 3-22, Sendai, Japan, August 2000. Springer-Verlag.
    • (2000) LNCS , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 33646045378 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of key-cycles
    • Sabrina De Capitani di Vimercati, Paul F. Syverson, and Dieter Gollmann, editors, ESORICS, Springer
    • Pedro Adão, Gergei Bana, Jonathan Herzog, and Andre Scedrov. Soundness of formal encryption in the presence of key-cycles. In Sabrina De Capitani di Vimercati, Paul F. Syverson, and Dieter Gollmann, editors, ESORICS, volume 3679 of Lecture Notes in Computer Science, pages 374-396. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3679 , pp. 374-396
    • Adão, P.1    Bana, G.2    Herzog, J.3    Scedrov, A.4
  • 7
    • 33749846305 scopus 로고    scopus 로고
    • Cryptographically-Masked flows
    • Kwangkeun Yi, editor, SAS, Springer
    • Aslan Askarov, Daniel Hedin, and Andrei Sabelfeld. Cryptographically- Masked flows. In Kwangkeun Yi, editor, SAS, volume 4134 of Lecture Notes in Computer Science, pages 353-369. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4134 , pp. 353-369
    • Askarov, A.1    Hedin, D.2    Sabelfeld, A.3
  • 9
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
    • Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December SpringerVerlag
    • Mihir Bellare and Chanathip Namprempre. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, volume 1976 of LNCS, pages 531-545, Kyoto, Japan, December 2000. Springer-Verlag.
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 11
    • 0031351741 scopus 로고    scopus 로고
    • A Concrete Security Treatment of Symmetric Encryption
    • Miami Beach, Florida, October IEEE Computer Society Press
    • Mihir Bellare, Anand Desai, Eron Jokipii, and Phillip Rogaway. A Concrete Security Treatment of Symmetric Encryption. In 38th Annual Symposium on Foundations of Computer Science, pages 394-403, Miami Beach, Florida, October 1997. IEEE Computer Society Press.
    • (1997) 38th Annual Symposium on Foundations of Computer Science , pp. 394-403
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 12
    • 35248822352 scopus 로고    scopus 로고
    • Encryption-scheme security in the presence of key-dependent messages
    • Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, Springer
    • John Black, Phillip Rogaway, and Thomas Shrimpton. Encryption-scheme security in the presence of key-dependent messages. In Kaisa Nyberg and Howard M. Heys, editors, Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, pages 62-75. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2595 , pp. 62-75
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 13
    • 84937553676 scopus 로고    scopus 로고
    • Static analysis for secrecy and non-interference in networks of processes
    • Victor E. Malyshkin, editor, PaCT, Springer
    • Chiara Bodei, Pierpaolo Degano, Flemming Nielson, and Hanne Riis Nielson. Static analysis for secrecy and non-interference in networks of processes. In Victor E. Malyshkin, editor, PaCT, volume 2127 of Lecture Notes in Computer Science, pages 27-41. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2127 , pp. 27-41
    • Bodei, C.1    Degano, P.2    Nielson, F.3    Nielson, H.R.4
  • 14
    • 24644437051 scopus 로고    scopus 로고
    • Computationally Sound, Automated Proofs for Security Protocols
    • Shmuel Sagiv, editor, Programming Languages and Systems, 14th European Symposium on Programming, ESOP 2005, Edinburgh, UK, April Springer-Verlag
    • Veronique Cortier and Bogdan Warinschi. Computationally Sound, Automated Proofs for Security Protocols. In Shmuel Sagiv, editor, Programming Languages and Systems, 14th European Symposium on Programming, ESOP 2005, volume 3444 of LNCS, pages 157-171, Edinburgh, UK, April 2005. Springer-Verlag.
    • (2005) LNCS , vol.3444 , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 15
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • Danny Dolev and Andrew C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198-208, March 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 18
    • 35048817402 scopus 로고    scopus 로고
    • Basic Tools
    • Cambridge University Press
    • Oded Goldreich. Foundations of Cryptography. Volume 1 - Basic Tools. Cambridge University Press, 2001.
    • (2001) Foundations of Cryptography , vol.1
    • Goldreich, O.1
  • 20
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and Program Analysis of Computationally Secure Information Flow
    • David Sands, editor, Programming Languages and Systems, 10th European Symposium on Programming, ESOP 2001, Genova, Italy, April Springer-Verlag
    • Peeter Laud. Semantics and Program Analysis of Computationally Secure Information Flow. In David Sands, editor, Programming Languages and Systems, 10th European Symposium on Programming, ESOP 2001, volume 2028 of LNCS, pages 77-91, Genova, Italy, April 2001. Springer-Verlag.
    • (2001) LNCS , vol.2028 , pp. 77-91
    • Laud, P.1
  • 21
    • 35248840989 scopus 로고    scopus 로고
    • Handling Encryption in Analyses for Secure Information Flow
    • Pierpaolo Degano, editor, Programming Languages and Systems, 12th European Symposium on Programming, ESOP 2003, Warsaw, Poland, April Springer-Verlag
    • Peeter Laud. Handling Encryption in Analyses for Secure Information Flow. In Pierpaolo Degano, editor, Programming Languages and Systems, 12th European Symposium on Programming, ESOP 2003, volume 2618 of LNCS, pages 159-173, Warsaw, Poland, April 2003. Springer-Verlag.
    • (2003) LNCS , vol.2618 , pp. 159-173
    • Laud, P.1
  • 22
    • 26844509701 scopus 로고    scopus 로고
    • A Type System for Computationally Secure Information Flow
    • Maciej Liśkiewicz and Rüdiger Reischuk, editors, 15th International Symposium on Fundamentals of Computation Theory (FCT) 2005, Lübeck, Germany, August Springer-Verlag
    • Peeter Laud and Varmo Vene. A Type System for Computationally Secure Information Flow. In Maciej Liśkiewicz and Rüdiger Reischuk, editors, 15th International Symposium on Fundamentals of Computation Theory (FCT) 2005, volume 3623 of LNCS, pages 365-377, Lübeck, Germany, August 2005. Springer-Verlag.
    • (2005) LNCS , vol.3623 , pp. 365-377
    • Laud, P.1    Vene, V.2
  • 28
    • 84957869855 scopus 로고    scopus 로고
    • A Per Model of Secure Information Flow in Sequential Programs
    • S. Doaitse Swierstra, editor, Programming Languages and Systems, 8th European Symposium on Programming, ESOP'99, Amsterdam, The Netherlands, March Springer-Verlag
    • Andrei Sabelfeld and David Sands. A Per Model of Secure Information Flow in Sequential Programs. In S. Doaitse Swierstra, editor, Programming Languages and Systems, 8th European Symposium on Programming, ESOP'99, volume 1576 of LNCS, pages 40-58, Amsterdam, The Netherlands, March 1999. Springer-Verlag.
    • (1999) LNCS , vol.1576 , pp. 40-58
    • Sabelfeld, A.1    Sands, D.2
  • 29
    • 28144453799 scopus 로고    scopus 로고
    • Dimensions and principles of declassification
    • IEEE Computer Society
    • Andrei Sabelfeld and David Sands. Dimensions and principles of declassification. In CSFW, pages 255-269. IEEE Computer Society, 2005.
    • (2005) CSFW , pp. 255-269
    • Sabelfeld, A.1    Sands, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.