Logics for Reasoning about Cryptographic Constructions (2003)

Cached

Download Links

by Russell Impagliazzo , Bruce M. Kapron
Venue:In Proc. 44th IEEE Symposium on Foundations of Computer Science
Citations:25 - 1 self

Documents Related by Co-Citation

336 Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) – - 2000
1053 On the Security of Public Key Protocols – - 1983
135 A Composable Cryptographic Library with Nested Operations (Extended Abstract) – - 2003
87 Soundness of formal encryption in the presence of active adversaries – - 2004
155 A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission – - 2000
112 A Probabilistic Poly-Time Framework for Protocol Analysis – - 1998
98 Formal Eavesdropping and its Computational Interpretation – - 2000
33 A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol – - 2004
626 Universally composable security: A new paradigm for cryptographic protocols – - 2013
53 Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries – - 2004
30 Plaintext awareness via key registration – - 2003
26 A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time – - 1998
54 Universally Composable Cryptographic Library – - 2003
59 Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library – - 2004
35 Symmetric Authentication within a Simulatable Cryptographic Library – - 2003
70 Semantics and Program Analysis of Computationally Secure Information Flow – - 2001
407 The inductive approach to verifying cryptographic protocols – - 1998
140 Composition and Integrity Preservation of Secure Reactive Systems – - 2000
786 A calculus for cryptographic protocols: The spi calculus – - 1999