Sound Computational Interpretation of Formal Encryption with Composed Keys
暂无分享,去创建一个
[1] Benjamin C. Pierce,et al. Theoretical Aspects of Computer Software , 2001, Lecture Notes in Computer Science.
[2] Oded Goldreich,et al. On the Foundations of Modern Cryptography , 1997, CRYPTO.
[3] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[4] Sebastian Mödersheim,et al. Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols , 2003 .
[5] Peeter Laud. Semantics and Program Analysis of Computationally Secure Information Flow , 2001, ESOP.
[6] L. Gong,et al. Using one-way functions for authentication , 1989, CCRV.
[7] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[8] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[9] Vitaly Shmatikov,et al. Constraint solving for bounded-process cryptographic protocol analysis , 2001, CCS '01.
[10] John Black,et al. Encryption-Scheme Security in the Presence of Key-Dependent Messages , 2002, Selected Areas in Cryptography.
[11] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[12] Alan O. Freier,et al. The SSL Protocol Version 3.0 , 1996 .
[13] Sandro Etalle,et al. An Improved Constraint-Based System for the Verification of Security Protocols , 2002, SAS.
[14] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[15] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[16] Martín Abadi,et al. Formal Eavesdropping and Its Computational Interpretation , 2001, TACS.
[17] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.
[18] Mihir Bellare,et al. Practice-Oriented Provable Security , 1998, Lectures on Data Security.
[19] Bogdan Warinschi,et al. Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions , 2004, J. Comput. Secur..
[20] Mihir Bellare,et al. A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications , 2003, EUROCRYPT.