Symmetric encryption in automatic analyses for confidentiality against active adversaries
暂无分享,去创建一个
[1] Silvio Micali,et al. Plaintext Awareness via Key Registration , 2003, CRYPTO.
[2] Birgit Pfitzmann,et al. Symmetric Authentication within a Simulatable Cryptographic Library , 2003, ESORICS.
[3] Peeter Laud,et al. Computationally secure information flow , 2002 .
[4] Michael Backes,et al. Cryptographically Sound and Machine-Assisted Verification of Security Protocols , 2003, STACS.
[5] Birgit Pfitzmann,et al. Cryptographic Security of Reactive Systems Extended Abstract , 2000 .
[6] Birgit Pfitzmann,et al. A Universally Composable Cryptographic Library , 2003, IACR Cryptol. ePrint Arch..
[7] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[8] Peeter Laud. Handling Encryption in Analyses for Secure Information Flow , 2001 .
[9] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[10] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[11] Martín Abadi,et al. Formal Eavesdropping and Its Computational Interpretation , 2001, TACS.
[12] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[13] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[14] Birgit Pfitzmann,et al. A model for asynchronous reactive systems and its application to secure message transmission , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[15] Birgit Pfitzmann,et al. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[16] F. Javier Thayer Fábrega,et al. Strand spaces: proving security protocols correct , 1999 .
[17] Joshua D. Guttman,et al. Strand Spaces: Proving Security Protocols Correct , 1999, J. Comput. Secur..
[18] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.
[19] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[20] J DenningPeter,et al. Certification of programs for secure information flow , 1977 .
[21] Ran Canetti. A unified framework for analyzing security of protocols , 2001, Electron. Colloquium Comput. Complex..
[22] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[23] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[24] John C. Mitchell,et al. A probabilistic poly-time framework for protocol analysis , 1998, CCS '98.
[25] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[26] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[27] Michael Backes,et al. Cryptographically sound analysis of security protocols , 2002 .
[28] Jonathan Herzog,et al. Computational soundness of formal adversaries , 2002 .
[29] K. Rustan M. Leino,et al. A semantic approach to secure information flow , 2000, Sci. Comput. Program..
[30] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[31] Birgit Pfitzmann,et al. Composition and integrity preservation of secure reactive systems , 2000, CCS.
[32] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[33] Hugo Krawczyk,et al. Universally Composable Notions of Key Exchange and Secure Channels , 2002, EUROCRYPT.
[34] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.