Security and composition of cryptographic protocols: a tutorial (part I)
暂无分享,去创建一个
[1] Moses D. Liskov,et al. Task-structured probabilistic I/O automata , 2006, 2006 8th International Workshop on Discrete Event Systems.
[2] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[3] John C. Mitchell,et al. Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus , 2003, CONCUR.
[4] Nancy A. Lynch,et al. Compositionality for Probabilistic Automata , 2003, CONCUR.
[5] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[6] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[7] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[8] Birgit Pfitzmann,et al. A model for asynchronous reactive systems and its application to secure message transmission , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] Birgit Pfitzmann,et al. Composition and integrity preservation of secure reactive systems , 2000, CCS.
[10] John C. Mitchell,et al. A probabilistic poly-time framework for protocol analysis , 1998, CCS '98.
[11] Ueli Maurer,et al. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.
[12] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[13] Ran Canetti,et al. Asynchronous secure computation , 1993, STOC.
[14] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[15] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[16] S. Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[17] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[18] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[19] Justin M. Reyneri,et al. Coin flipping by telephone , 1984, IEEE Trans. Inf. Theory.
[20] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[21] Birgit Pfitzmann,et al. Secure Asynchronous Reactive Systems , 2004 .
[22] Donald Beaver,et al. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority , 2004, Journal of Cryptology.
[23] Vanessa Teague,et al. A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols ( Preliminary Report ) , 2001 .
[24] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[25] Robin Milner,et al. Communicating and mobile systems - the Pi-calculus , 1999 .
[26] Ran Canetti. Security and Composition of Multi-party Cryptographic Protocols , 1998 .
[27] Birgit Pfitzmann,et al. A General Framework for Formal Notions of "Secure" Systems , 1994 .
[28] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[29] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[30] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[31] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[32] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[33] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.