Logics for Reasoning about Cryptographic Constructions (2003)

Cached

Download Links

by Russell Impagliazzo , Bruce M. Kapron
Venue:In Proc. 44th IEEE Symposium on Foundations of Computer Science
Citations:25 - 1 self

Active Bibliography

17 Computationally Sound Mechanized Proofs of Correspondence Assertions – Bruno Blanchet - 2007
45 Universally composable symbolic analysis of mutual authentication and key-exchange protocols – Ran Canetti, Jonathan Herzog - 2006
Software Quality and Infrastructure Protection for Diffuse Computing – J. Feigenbaum, J. Y. Halpern, P. D. Lincoln, J. C. Mitchell, A. Scedrov, J. M. Smith Ý, P. Syverson Þ
8 Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions – Michael Backes - 2003
13 Computationally sound secrecy proofs by mechanized flow analysis – Michael Backes, Peeter Laud - 2006
33 A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol – Michael Backes, Birgit Pfitzmann - 2004
3 Random polynomial-time attacks and Dolev-Yao models – Mathieu Baudet - 2005
85 Soundness of formal encryption in the presence of active adversaries – Daniele Micciancio, Bogdan Warinschi - 2004
11 Encryption Cycles and Two Views of Cryptography – Peeter Laud - 2002
Pushing the Limits of Formal Verification – Michael Backes, Matthias Schunter
35 Symmetric Authentication within a Simulatable Cryptographic Library – Michael Backes, Birgit Pfitzmann, Michael Waidner - 2003
7 Compositional security for Task-PIOAs – Ran Canetti, Ling Cheung, Nancy Lynch, Dilsun Kaynar, Olivier Pereira - 2007
Andre Scedrov, Supervisor of Dissertation David Harbater, Graduate Group ChairpersonCOPYRIGHT – Gergely Bana, Gergely Bana
5 Logical Concepts in Cryptography – Simon Kramer - 2006
8 Soundness and Completeness of Formal Logics of Symmetric Encryption – Gergei Bana - 2005
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key – Xinfeng Lei, Rui Xue, Ting Yu
4 Secure Asynchronous Reactive Systems – Michael Backes, Birgit Pfitzmann, Michael Waidner - 2004
44 A probabilistic polynomial-time calculus for analysis of cryptographic protocols – John C. Mitchell, Ajith Ramanathan, Andre Scedrov, Vanessa Teague - 2001
24 A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol – Michael Backes - 2004