메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1247-1259

Fully automated analysis of padding-based encryption in the computational model

Author keywords

attack finding; automated proofs; provable security; public key encryption; static equivalence

Indexed keywords

ATTACK FINDING; AUTOMATED PROOFS; PROVABLE SECURITY; PUBLIC-KEY ENCRYPTION; STATIC EQUIVALENCE;

EID: 84889002380     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516663     Document Type: Conference Paper
Times cited : (34)

References (31)
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). J. Cryptology, 15(2):103-127, 2002.
    • (2002) J. Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 84859308645 scopus 로고    scopus 로고
    • Towards unconditional soundness: Computationally complete symbolic attacker
    • 1st Conference on Principles of Security and Trust - POST 2012, Springer
    • G. Bana and H. Comon-Lundh. Towards unconditional soundness: Computationally complete symbolic attacker. In 1st Conference on Principles of Security and Trust - POST 2012, volume 7215 of LNCS, pages 189-208, 2012. Springer.
    • (2012) LNCS , vol.7215 , pp. 189-208
    • Bana, G.1    Comon-Lundh, H.2
  • 4
    • 80051978821 scopus 로고    scopus 로고
    • Computer-aided security proofs for the working cryptographer
    • Advances in Cryptology - CRYPTO 2011, Springer
    • G. Barthe, B. Grégoire, S. Heraud, and S. Zanella-Béguelin. Computer-aided security proofs for the working cryptographer. In Advances in Cryptology - CRYPTO 2011, volume 6841 of LNCS, pages 71-90, 2011. Springer.
    • (2011) LNCS , vol.6841 , pp. 71-90
    • Barthe, G.1    Grégoire, B.2    Heraud, S.3    Zanella-Béguelin, S.4
  • 5
    • 79951804314 scopus 로고    scopus 로고
    • Beyond provable security. Verifiable INDCCA security of OAEP
    • Topics in Cryptology - CTRSA 2011, Springer
    • G. Barthe, B. Grégoire, Y. Lakhnech, and S. Zanella- Béguelin. Beyond provable security. Verifiable INDCCA security of OAEP. In Topics in Cryptology - CTRSA 2011, volume 6558 of LNCS, pages 180-196, 2011. Springer.
    • (2011) LNCS , vol.6558 , pp. 180-196
    • Barthe, G.1    Grégoire, B.2    Lakhnech, Y.3    Zanella-Béguelin, S.4
  • 9
    • 60549089343 scopus 로고    scopus 로고
    • Computationally sound implementations of equational theories against passive adversaries
    • M. Baudet, V. Cortier, and S. Kremer. Computationally sound implementations of equational theories against passive adversaries. Inf. Comput., 207(4):496-520, 2009.
    • (2009) Inf. Comput. , vol.207 , Issue.4 , pp. 496-520
    • Baudet, M.1    Cortier, V.2    Kremer, S.3
  • 11
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • Advances in Cryptology - EUROCRYPT 1994, Springer
    • M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Advances in Cryptology - EUROCRYPT 1994, volume 950 of LNCS, pages 92-111, 1994. Springer.
    • (1994) LNCS , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 12
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • IEEE Computer Society
    • B. Blanchet. A computationally sound mechanized prover for security protocols. In 27th IEEE Symposium on Security and Privacy, S&P 2006, pages 140-154. IEEE Computer Society, 2006.
    • (2006) 27th IEEE Symposium on Security and Privacy, S&P 2006 , pp. 140-154
    • Blanchet, B.1
  • 13
    • 84859357099 scopus 로고    scopus 로고
    • Security protocol verification: Symbolic and computational models
    • 1st International Conference on Principles of Security and Trust, POST 2012, Springer
    • B. Blanchet. Security protocol verification: Symbolic and computational models. In 1st International Conference on Principles of Security and Trust, POST 2012, volume 7215 of LNCS, pages 3-29, 2012. Springer.
    • (2012) LNCS , vol.7215 , pp. 3-29
    • Blanchet, B.1
  • 14
    • 78650941074 scopus 로고    scopus 로고
    • Simplified OAEP for the RSA and Rabin functions
    • Advances in Cryptology - CRYPTO 2001, Springer
    • D. Boneh. Simplified OAEP for the RSA and Rabin functions. In Advances in Cryptology - CRYPTO 2001, volume 2139 of LNCS, pages 275-291, 2001. Springer.
    • (2001) LNCS , vol.2139 , pp. 275-291
    • Boneh, D.1
  • 15
    • 69949148046 scopus 로고    scopus 로고
    • Computing knowledge in security protocols under convergent equational theories
    • Springer
    • Ş. Ciobâcǎ, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. In Automated Deduction-CADE-22, pages 355-370. Springer, 2009.
    • (2009) Automated Deduction-CADE-22 , pp. 355-370
    • Ciobâcǎ, Ş.1    Delaune, S.2    Kremer, S.3
  • 16
    • 84937413370 scopus 로고    scopus 로고
    • Universal padding schemes for RSA
    • Advances in Cryptology - CRYPTO 2002, Springer
    • J.-S. Coron, M. Joye, D. Naccache, and P. Paillier. Universal padding schemes for RSA. In Advances in Cryptology - CRYPTO 2002, volume 2442 of LNCS, pages 226-241, 2002. Springer.
    • (2002) LNCS , vol.2442 , pp. 226-241
    • Coron, J.-S.1    Joye, M.2    Naccache, D.3    Paillier, P.4
  • 17
    • 79956129556 scopus 로고    scopus 로고
    • A survey of symbolic methods in computational analysis of cryptographic systems
    • V. Cortier, S. Kremer, and B. Warinschi. A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning, 46(3-4):225-259, 2011.
    • (2011) J. Autom. Reasoning , vol.46 , Issue.3-4 , pp. 225-259
    • Cortier, V.1    Kremer, S.2    Warinschi, B.3
  • 22
    • 32844456499 scopus 로고    scopus 로고
    • Logics for reasoning about cryptographic constructions
    • R. Impagliazzo and B. M. Kapron. Logics for reasoning about cryptographic constructions. J. Comput. Syst. Sci., 72(2):286-320, 2006.
    • (2006) J. Comput. Syst. Sci. , vol.72 , Issue.2 , pp. 286-320
    • Impagliazzo, R.1    Kapron, B.M.2
  • 24
    • 33646805724 scopus 로고    scopus 로고
    • Taxonomical security consideration of OAEP variants
    • Y. Komano and K. Ohta. Taxonomical security consideration of OAEP variants. IEICE Transactions, E89-A (5):1233-1245, 2006.
    • (2006) IEICE Transactions , vol.E89-A , Issue.5 , pp. 1233-1245
    • Komano, Y.1    Ohta, K.2
  • 25
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A. K. Lenstra and E. R. Verheul. Selecting cryptographic key sizes. J. Cryptology, 14(4):255-293, 2001.
    • (2001) J. Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 26
    • 84937389342 scopus 로고    scopus 로고
    • The gap-problems: A new class of problems for the security of cryptographic schemes
    • 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Springer
    • T. Okamoto and D. Pointcheval. The gap-problems: A new class of problems for the security of cryptographic schemes. In 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, volume 1992 of LNCS, pages 104-118, 2001. Springer.
    • (2001) LNCS , vol.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 27
    • 0033682447 scopus 로고    scopus 로고
    • Looking for diamonds in the desert - extending automatic protocol generation to three-party authentication and key agreement protocols
    • IEEE Computer Society
    • A. Perrig and D. Song. Looking for diamonds in the desert - extending automatic protocol generation to three-party authentication and key agreement protocols. In 13th IEEE Workshop on Computer Security Foundations, CSFW 2000, pages 64-76, 2000. IEEE Computer Society.
    • (2000) 13th IEEE Workshop on Computer Security Foundations, CSFW 2000 , pp. 64-76
    • Perrig, A.1    Song, D.2
  • 28
  • 29
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • Report 2004/332
    • V. Shoup. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332.
    • Cryptology EPrint Archive
    • Shoup, V.1
  • 30
    • 80755144096 scopus 로고    scopus 로고
    • The impossibility of computationally sound XOR
    • Report 2010/389
    • D. Unruh. The impossibility of computationally sound XOR. Cryptology ePrint Archive, Report 2010/389.
    • Cryptology EPrint Archive
    • Unruh, D.1
  • 31
    • 85028933312 scopus 로고
    • Practical approaches to attaining security against adaptively chosen ciphertext attacks
    • Advances in Cryptology - CRYPTO 1992, Springer
    • Y. Zheng and J. Seberry. Practical approaches to attaining security against adaptively chosen ciphertext attacks. In Advances in Cryptology - CRYPTO 1992, volume 740 of LNCS, pages 292-304, 1993. Springer.
    • (1993) LNCS , vol.740 , pp. 292-304
    • Zheng, Y.1    Seberry, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.