Logics for Reasoning about Cryptographic Constructions (2003)

Cached

Download Links

by Russell Impagliazzo , Bruce M. Kapron
Venue:In Proc. 44th IEEE Symposium on Foundations of Computer Science
Citations:25 - 1 self

Documents Related by Co-Citation

333 Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) – Martín Abadi, Phillip Rogaway - 2000
1044 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
133 A Composable Cryptographic Library with Nested Operations (Extended Abstract) – Michael Backes, Birgit Pfitzmann, Michael Waidner - 2003
85 Soundness of formal encryption in the presence of active adversaries – Daniele Micciancio, Bogdan Warinschi - 2004
153 A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission – Birgit Pfitzmann, Michael Waidner - 2000
114 A Probabilistic Poly-Time Framework for Protocol Analysis – P. Lincoln, J. Mitchell, M. Mitchell, A. Scedrov - 1998
98 Formal Eavesdropping and its Computational Interpretation – Martín Abadi, Jan Jürjens - 2000
33 A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol – Michael Backes, Birgit Pfitzmann - 2004
611 Universally composable security: A new paradigm for cryptographic protocols – Ran Canetti - 2013
53 Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries – Peeter Laud - 2004
30 Plaintext awareness via key registration – Jonathan Herzog, Moses Liskov, Silvio Micali - 2003
26 A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time – J. Mitchell, M. Mitchell, A. Scedrov - 1998
54 Universally Composable Cryptographic Library – Michael Backes, Birgit Pfitzmann, Michael Waidner - 2003
58 Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library – Michael Backes, Birgit Pfitzmann - 2004
35 Symmetric Authentication within a Simulatable Cryptographic Library – Michael Backes, Birgit Pfitzmann, Michael Waidner - 2003
69 Semantics and Program Analysis of Computationally Secure Information Flow – Peeter Laud - 2001
406 The inductive approach to verifying cryptographic protocols – Lawrence C. Paulson - 1998
138 Composition and Integrity Preservation of Secure Reactive Systems – Birgit Pfitzmann, Michael Waidner - 2000
783 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999