Sciweavers

117 search results - page 1 / 24
» A symbolic framework for multi-faceted security protocol ana...
Sort
View
IJISEC
2008
46views more  IJISEC 2008»
13 years 11 months ago
A symbolic framework for multi-faceted security protocol analysis
Andrea Bracciali, GianLuigi Ferrari, Emilio Tuosto
JOC
2011
157views more  JOC 2011»
13 years 5 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
CCS
2005
ACM
14 years 4 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 4 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
ESORICS
2009
Springer
14 years 11 months ago
Computationally Sound Analysis of a Probabilistic Contract Signing Protocol
We propose a probabilistic contract signing protocol that achieves balance even in the presence of an adversary that may delay messages sent over secure channels. To show that this...
Mihhail Aizatulin, Henning Schnoor, Thomas Wilke