메뉴 건너뛰기




Volumn 4337 LNCS, Issue , 2006, Pages 176-187

Computationally sound symbolic secrecy in the presence of hash functions

Author keywords

[No Author keywords available]

Indexed keywords

SOFTWARE ENGINEERING;

EID: 84962447835     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11944836_18     Document Type: Conference Paper
Times cited : (31)

References (16)
  • 1
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography
    • LNCS, August
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography. In IFIP TCS 2000, volume 1872 of LNCS, pages 3–22, August 2000.
    • (2000) IFIP TCS 2000 , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 35248899328 scopus 로고    scopus 로고
    • Cryptographically sound and machine-assisted verification of security protocols
    • M. Backes and I. Christian Jacobi. Cryptographically sound and machine-assisted verification of security protocols. In STACS 2003, pages 675–686, 2003.
    • (2003) STACS , vol.2003 , pp. 675-686
    • Backes, M.1    Christian Jacobi, I.2
  • 5
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • LNCS
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In Crypto’93, volume 773 of LNCS, pages 232–249, 1993.
    • (1993) Crypto’93 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 85025820922 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • To appear
    • R. Canetti and J. Herzog. Soundness of formal encryption in the presence of active adversaries. In TCC 2006, LNCS, 2006. To appear.
    • (2006) TCC 2006, LNCS
    • Canetti, R.1    Herzog, J.2
  • 8
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In LICS 2003, pages 271–280, 2003.
    • (2003) LICS , pp. 271-280
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 10
    • 24644437051 scopus 로고    scopus 로고
    • Computationally Sound, Automated Proofs for Security Protocols
    • LNCS
    • V. Cortier and B. Warinschi. Computationally Sound, Automated Proofs for Security Protocols. In ESOP 2005, volume 3444 of LNCS, pages 157–171, 2005.
    • (2005) ESOP 2005 , vol.3444 , pp. 157-171
    • Cortier, V.1    Warinschi, B.2
  • 12
    • 31844437459 scopus 로고    scopus 로고
    • Towards computationally sound symbolic analysis of key exchange protocols
    • P. Gupta and V. Shmatikov. Towards computationally sound symbolic analysis of key exchange protocols. In FMSE 2005, pages 23–32, 2005.
    • (2005) FMSE , vol.2005 , pp. 23-32
    • Gupta, P.1    Shmatikov, V.2
  • 13
    • 85025804587 scopus 로고    scopus 로고
    • Computational soundness of symbolic analysis for protocols using hash functions
    • To appear
    • R. Janvier, Y. Lakhnech, and L. Mazaré. Computational soundness of symbolic analysis for protocols using hash functions. In ICS’06, 2006. To appear.
    • (2006) ICS’06
    • Janvier, R.1    Lakhnech, Y.2    Mazaré, L.3
  • 14
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • LNCS
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In TCC 2004, volume 2951 of LNCS, pages 133–151, 2004.
    • (2004) TCC 2004 , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 15
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In CCS 2001, pages 166–175, 2001.
    • (2001) CCS , vol.2001 , pp. 166-175
    • Millen, J.K.1    Shmatikov, V.2
  • 16
    • 0037453396 scopus 로고    scopus 로고
    • Protocol Insecurity with Finite Number of Sessions and Composed Keys is NP-complete
    • M. Rusinowitch and M. Turuani. Protocol Insecurity with Finite Number of Sessions and Composed Keys is NP-complete. Theoretical Computer Science, 299:451–475, April 2003.
    • (2003) Theoretical Computer Science , vol.299 April , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.