-
1
-
-
17644411480
-
Mobile values, new names, and secure communication
-
ACM
-
M. Abadi and C. Fournet. Mobile values, new names, and secure communication. In 28th ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, POPL 2001, pages 104-115, 2001. ACM.
-
(2001)
28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2001
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). J. Cryptology, 15(2):103-127, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
84859308645
-
Towards unconditional soundness: Computationally complete symbolic attacker
-
1st Conference on Principles of Security and Trust - POST 2012, Springer
-
G. Bana and H. Comon-Lundh. Towards unconditional soundness: Computationally complete symbolic attacker. In 1st Conference on Principles of Security and Trust - POST 2012, volume 7215 of LNCS, pages 189-208, 2012. Springer.
-
(2012)
LNCS
, vol.7215
, pp. 189-208
-
-
Bana, G.1
Comon-Lundh, H.2
-
4
-
-
80051978821
-
Computer-aided security proofs for the working cryptographer
-
Advances in Cryptology - CRYPTO 2011, Springer
-
G. Barthe, B. Grégoire, S. Heraud, and S. Zanella-Béguelin. Computer-aided security proofs for the working cryptographer. In Advances in Cryptology - CRYPTO 2011, volume 6841 of LNCS, pages 71-90, 2011. Springer.
-
(2011)
LNCS
, vol.6841
, pp. 71-90
-
-
Barthe, G.1
Grégoire, B.2
Heraud, S.3
Zanella-Béguelin, S.4
-
5
-
-
79951804314
-
Beyond provable security. Verifiable INDCCA security of OAEP
-
Topics in Cryptology - CTRSA 2011, Springer
-
G. Barthe, B. Grégoire, Y. Lakhnech, and S. Zanella- Béguelin. Beyond provable security. Verifiable INDCCA security of OAEP. In Topics in Cryptology - CTRSA 2011, volume 6558 of LNCS, pages 180-196, 2011. Springer.
-
(2011)
LNCS
, vol.6558
, pp. 180-196
-
-
Barthe, G.1
Grégoire, B.2
Lakhnech, Y.3
Zanella-Béguelin, S.4
-
6
-
-
84889051727
-
Fully automated analysis of padding-based encryption in the computational model
-
Report 2012/695
-
G. Barthe, J. M. Crespo, B. Grégoire, C. Kunz, Y. Lakhnech, B. Schmidt, and S. Zanella-Béguelin. Fully automated analysis of padding-based encryption in the computational model. Cryptology ePrint Archive, Report 2012/695.
-
Cryptology EPrint Archive
-
-
Barthe, G.1
Crespo, J.M.2
Grégoire, B.3
Kunz, C.4
Lakhnech, Y.5
Schmidt, B.6
Zanella-Béguelin, S.7
-
7
-
-
84869469121
-
Verified security of redundancy-free encryption from Rabin and RSA
-
ACM
-
G. Barthe, D. Pointcheval, and S. Zanella-Béguelin. Verified security of redundancy-free encryption from Rabin and RSA. In 19th ACM Conference on Computer and Communications Security, CCS 2012, pages 724-735, 2012. ACM.
-
(2012)
19th ACM Conference on Computer and Communications Security, CCS 2012
, pp. 724-735
-
-
Barthe, G.1
Pointcheval, D.2
Zanella-Béguelin, S.3
-
9
-
-
60549089343
-
Computationally sound implementations of equational theories against passive adversaries
-
M. Baudet, V. Cortier, and S. Kremer. Computationally sound implementations of equational theories against passive adversaries. Inf. Comput., 207(4):496-520, 2009.
-
(2009)
Inf. Comput.
, vol.207
, Issue.4
, pp. 496-520
-
-
Baudet, M.1
Cortier, V.2
Kremer, S.3
-
11
-
-
84948986458
-
Optimal asymmetric encryption
-
Advances in Cryptology - EUROCRYPT 1994, Springer
-
M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Advances in Cryptology - EUROCRYPT 1994, volume 950 of LNCS, pages 92-111, 1994. Springer.
-
(1994)
LNCS
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
12
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
IEEE Computer Society
-
B. Blanchet. A computationally sound mechanized prover for security protocols. In 27th IEEE Symposium on Security and Privacy, S&P 2006, pages 140-154. IEEE Computer Society, 2006.
-
(2006)
27th IEEE Symposium on Security and Privacy, S&P 2006
, pp. 140-154
-
-
Blanchet, B.1
-
13
-
-
84859357099
-
Security protocol verification: Symbolic and computational models
-
1st International Conference on Principles of Security and Trust, POST 2012, Springer
-
B. Blanchet. Security protocol verification: Symbolic and computational models. In 1st International Conference on Principles of Security and Trust, POST 2012, volume 7215 of LNCS, pages 3-29, 2012. Springer.
-
(2012)
LNCS
, vol.7215
, pp. 3-29
-
-
Blanchet, B.1
-
14
-
-
78650941074
-
Simplified OAEP for the RSA and Rabin functions
-
Advances in Cryptology - CRYPTO 2001, Springer
-
D. Boneh. Simplified OAEP for the RSA and Rabin functions. In Advances in Cryptology - CRYPTO 2001, volume 2139 of LNCS, pages 275-291, 2001. Springer.
-
(2001)
LNCS
, vol.2139
, pp. 275-291
-
-
Boneh, D.1
-
15
-
-
69949148046
-
Computing knowledge in security protocols under convergent equational theories
-
Springer
-
Ş. Ciobâcǎ, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. In Automated Deduction-CADE-22, pages 355-370. Springer, 2009.
-
(2009)
Automated Deduction-CADE-22
, pp. 355-370
-
-
Ciobâcǎ, Ş.1
Delaune, S.2
Kremer, S.3
-
16
-
-
84937413370
-
Universal padding schemes for RSA
-
Advances in Cryptology - CRYPTO 2002, Springer
-
J.-S. Coron, M. Joye, D. Naccache, and P. Paillier. Universal padding schemes for RSA. In Advances in Cryptology - CRYPTO 2002, volume 2442 of LNCS, pages 226-241, 2002. Springer.
-
(2002)
LNCS
, vol.2442
, pp. 226-241
-
-
Coron, J.-S.1
Joye, M.2
Naccache, D.3
Paillier, P.4
-
17
-
-
79956129556
-
A survey of symbolic methods in computational analysis of cryptographic systems
-
V. Cortier, S. Kremer, and B. Warinschi. A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning, 46(3-4):225-259, 2011.
-
(2011)
J. Autom. Reasoning
, vol.46
, Issue.3-4
, pp. 225-259
-
-
Cortier, V.1
Kremer, S.2
Warinschi, B.3
-
18
-
-
70349275452
-
Towards automated proofs for asymmetric encryption schemes in the random oracle model
-
ACM
-
J. Courant, M. Daubignard, C. Ene, P. Lafourcade, and Y. Lakhnech. Towards automated proofs for asymmetric encryption schemes in the random oracle model. In 15th ACM Conference on Computer and Communications Security, CCS 2008, pages 371-380, 2008. ACM.
-
(2008)
15th ACM Conference on Computer and Communications Security, CCS 2008
, pp. 371-380
-
-
Courant, J.1
Daubignard, M.2
Ene, C.3
Lafourcade, P.4
Lakhnech, Y.5
-
20
-
-
4344662082
-
RSA-OAEP is secure under the RSA assumption
-
E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern. RSA-OAEP is secure under the RSA assumption. J. Cryptology, 17(2):81-104, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.2
, pp. 81-104
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
22
-
-
32844456499
-
Logics for reasoning about cryptographic constructions
-
R. Impagliazzo and B. M. Kapron. Logics for reasoning about cryptographic constructions. J. Comput. Syst. Sci., 72(2):286-320, 2006.
-
(2006)
J. Comput. Syst. Sci.
, vol.72
, Issue.2
, pp. 286-320
-
-
Impagliazzo, R.1
Kapron, B.M.2
-
23
-
-
77956987902
-
Factorization of a 768-bit RSA modulus
-
Advances in Cryptology - CRYPTO 2010, Springer
-
T. Kleinjung, K. Aoki, J. Franke, A. Lenstra, E. Thomé, J. Bos, P. Gaudry, A. Kruppa, P. Montgomery, D. Osvik, H. te Riele, A. Timofeev, and P. Zimmermann. Factorization of a 768-bit RSA modulus. In Advances in Cryptology - CRYPTO 2010, volume 6223 of LNCS, pages 333-350, 2010. Springer.
-
(2010)
LNCS
, vol.6223
, pp. 333-350
-
-
Kleinjung, T.1
Aoki, K.2
Franke, J.3
Lenstra, A.4
Thomé, E.5
Bos, J.6
Gaudry, P.7
Kruppa, A.8
Montgomery, P.9
Osvik, D.10
Te Riele, H.11
Timofeev, A.12
Zimmermann, P.13
-
24
-
-
33646805724
-
Taxonomical security consideration of OAEP variants
-
Y. Komano and K. Ohta. Taxonomical security consideration of OAEP variants. IEICE Transactions, E89-A (5):1233-1245, 2006.
-
(2006)
IEICE Transactions
, vol.E89-A
, Issue.5
, pp. 1233-1245
-
-
Komano, Y.1
Ohta, K.2
-
25
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. K. Lenstra and E. R. Verheul. Selecting cryptographic key sizes. J. Cryptology, 14(4):255-293, 2001.
-
(2001)
J. Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
26
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Springer
-
T. Okamoto and D. Pointcheval. The gap-problems: A new class of problems for the security of cryptographic schemes. In 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, volume 1992 of LNCS, pages 104-118, 2001. Springer.
-
(2001)
LNCS
, vol.1992
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
27
-
-
0033682447
-
Looking for diamonds in the desert - extending automatic protocol generation to three-party authentication and key agreement protocols
-
IEEE Computer Society
-
A. Perrig and D. Song. Looking for diamonds in the desert - extending automatic protocol generation to three-party authentication and key agreement protocols. In 13th IEEE Workshop on Computer Security Foundations, CSFW 2000, pages 64-76, 2000. IEEE Computer Society.
-
(2000)
13th IEEE Workshop on Computer Security Foundations, CSFW 2000
, pp. 64-76
-
-
Perrig, A.1
Song, D.2
-
28
-
-
77957131927
-
Inductive trace properties for computational security
-
A. Roy, A. Datta, A. Derek, and J. C. Mitchell. Inductive trace properties for computational security. Journal of Computer Security, 18(6):1035-1073, 2010.
-
(2010)
Journal of Computer Security
, vol.18
, Issue.6
, pp. 1035-1073
-
-
Roy, A.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
-
29
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
Report 2004/332
-
V. Shoup. Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332.
-
Cryptology EPrint Archive
-
-
Shoup, V.1
-
30
-
-
80755144096
-
The impossibility of computationally sound XOR
-
Report 2010/389
-
D. Unruh. The impossibility of computationally sound XOR. Cryptology ePrint Archive, Report 2010/389.
-
Cryptology EPrint Archive
-
-
Unruh, D.1
-
31
-
-
85028933312
-
Practical approaches to attaining security against adaptively chosen ciphertext attacks
-
Advances in Cryptology - CRYPTO 1992, Springer
-
Y. Zheng and J. Seberry. Practical approaches to attaining security against adaptively chosen ciphertext attacks. In Advances in Cryptology - CRYPTO 1992, volume 740 of LNCS, pages 292-304, 1993. Springer.
-
(1993)
LNCS
, vol.740
, pp. 292-304
-
-
Zheng, Y.1
Seberry, J.2
|