IPDL: A Probabilistic Dataflow Logic for Cryptography
暂无分享,去创建一个
[1] Andrew Miller,et al. ILC: a calculus for composable, computational cryptography , 2019, IACR Cryptol. ePrint Arch..
[2] Hubert Comon-Lundh,et al. Towards Unconditional Soundness: Computationally Complete Symbolic Attacker , 2012, POST.
[3] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[4] John C. Mitchell,et al. A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report) , 2001, MFPS.
[5] Hubert Comon-Lundh,et al. A Computationally Complete Symbolic Attacker for Equivalence Properties , 2014, CCS.
[6] Nancy A. Lynch,et al. Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol , 2005, IACR Cryptol. ePrint Arch..
[7] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[8] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[9] J. Gregory Morrisett,et al. The Foundational Cryptography Framework , 2014, POST.
[10] Ran Canetti,et al. Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols , 2006, DISC.
[11] P. Cogn,et al. A Computationally Sound Mechanized Prover for Security Protocols , 2009 .
[12] Ueli Maurer,et al. Formalizing Constructive Cryptography using CryptHOL , 2019, 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).
[13] Stefano Tessaro,et al. An equational approach to secure multi-party computation , 2013, ITCS '13.
[14] Benjamin Grégoire,et al. Symbolic Methods in Computational Cryptography Proofs , 2019, 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).
[15] Benjamin Grégoire,et al. Computer-Aided Security Proofs for the Working Cryptographer , 2011, CRYPTO.
[16] Ran Canetti,et al. Task-structured probabilistic I/O automata , 2006, J. Comput. Syst. Sci..
[17] Ueli Maurer,et al. Constructive Cryptography - A New Paradigm for Security Definitions and Proofs , 2011, TOSCA.
[18] Birgit Pfitzmann,et al. The reactive simulatability (RSIM) framework for asynchronous systems , 2007, Inf. Comput..
[19] Rohit Chadha,et al. Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability , 2019, IACR Cryptol. ePrint Arch..
[20] Cas J. F. Cremers,et al. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.
[21] Ran Canetti,et al. EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security , 2019, 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).
[22] David A. Basin,et al. The TAMARIN Prover for the Symbolic Analysis of Security Protocols , 2013, CAV.
[23] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.