-
1
-
-
84879078812
-
Reconciling two views of cryptography
-
LNCS, August
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography. In IFIP TCS 2000, volume 1872 of LNCS, pages 3–22, August 2000.
-
(2000)
IFIP TCS 2000
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
26444497860
-
The Avispa tool for the automated validation of internet security protocols and applications
-
LNCS
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. H. Drielsma, P. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The Avispa tool for the automated validation of internet security protocols and applications. In CAV 2005, volume 3576 of LNCS, 2005.
-
(2005)
CAV 2005
, vol.3576
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Heám, P.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
3
-
-
35248899328
-
Cryptographically sound and machine-assisted verification of security protocols
-
M. Backes and I. Christian Jacobi. Cryptographically sound and machine-assisted verification of security protocols. In STACS 2003, pages 675–686, 2003.
-
(2003)
STACS
, vol.2003
, pp. 675-686
-
-
Backes, M.1
Christian Jacobi, I.2
-
5
-
-
84945119254
-
Entity authentication and key distribution
-
LNCS
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Crypto’93, volume 773 of LNCS, pages 232–249, 1993.
-
(1993)
Crypto’93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
85025820922
-
Soundness of formal encryption in the presence of active adversaries
-
To appear
-
R. Canetti and J. Herzog. Soundness of formal encryption in the presence of active adversaries. In TCC 2006, LNCS, 2006. To appear.
-
(2006)
TCC 2006, LNCS
-
-
Canetti, R.1
Herzog, J.2
-
8
-
-
0042467908
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In LICS 2003, pages 271–280, 2003.
-
(2003)
LICS
, pp. 271-280
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
9
-
-
85025814082
-
-
Research Report 2006/218, Cryptology ePrint Archive, June 2006
-
V. Cortier, S. Kremer, R. Küsters, and B. Warinschi. Computationally sound symbolic secrecy in the presence of hash functions. Research Report 2006/218, Cryptology ePrint Archive, June 2006. 31 pages.
-
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
, pp. 31
-
-
Cortier, V.1
Kremer, S.2
Küsters, R.3
Warinschi, B.4
-
10
-
-
24644437051
-
Computationally Sound, Automated Proofs for Security Protocols
-
LNCS
-
V. Cortier and B. Warinschi. Computationally Sound, Automated Proofs for Security Protocols. In ESOP 2005, volume 3444 of LNCS, pages 157–171, 2005.
-
(2005)
ESOP 2005
, vol.3444
, pp. 157-171
-
-
Cortier, V.1
Warinschi, B.2
-
12
-
-
31844437459
-
Towards computationally sound symbolic analysis of key exchange protocols
-
P. Gupta and V. Shmatikov. Towards computationally sound symbolic analysis of key exchange protocols. In FMSE 2005, pages 23–32, 2005.
-
(2005)
FMSE
, vol.2005
, pp. 23-32
-
-
Gupta, P.1
Shmatikov, V.2
-
13
-
-
85025804587
-
Computational soundness of symbolic analysis for protocols using hash functions
-
To appear
-
R. Janvier, Y. Lakhnech, and L. Mazaré. Computational soundness of symbolic analysis for protocols using hash functions. In ICS’06, 2006. To appear.
-
(2006)
ICS’06
-
-
Janvier, R.1
Lakhnech, Y.2
Mazaré, L.3
-
14
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
LNCS
-
D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In TCC 2004, volume 2951 of LNCS, pages 133–151, 2004.
-
(2004)
TCC 2004
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
15
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In CCS 2001, pages 166–175, 2001.
-
(2001)
CCS
, vol.2001
, pp. 166-175
-
-
Millen, J.K.1
Shmatikov, V.2
-
16
-
-
0037453396
-
Protocol Insecurity with Finite Number of Sessions and Composed Keys is NP-complete
-
M. Rusinowitch and M. Turuani. Protocol Insecurity with Finite Number of Sessions and Composed Keys is NP-complete. Theoretical Computer Science, 299:451–475, April 2003.
-
(2003)
Theoretical Computer Science
, vol.299 April
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
|