Sciweavers

783 search results - page 16 / 157
» On security proof of McCullagh
Sort
View
ASIAN
2009
Springer
308views Algorithms» more  ASIAN 2009»
13 years 11 months ago
Automated Security Proof for Symmetric Encryption Modes
Abstract. We presents a compositional Hoare logic for proving semantic security of modes of operation for symmetric key block ciphers. We propose a simple programming language to s...
Martin Gagné, Pascal Lafourcade, Yassine La...
ESORICS
2005
Springer
14 years 3 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 3 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
IJNSEC
2007
115views more  IJNSEC 2007»
13 years 9 months ago
Security Proof of the Original SOK-IBS Scheme
The identity-based signature (IBS) scheme proposed by Sakai, Ohgishi and Kasahara in 2000, which we refer to as the SOK-IBS scheme, is the first pairing-based IBS scheme. Though ...
Xiao-Ming Lu, Dengguo Feng
CAV
2009
Springer
106views Hardware» more  CAV 2009»
14 years 10 months ago
Models and Proofs of Protocol Security: A Progress Report
Bruno Blanchet, Hubert Comon-Lundh, Martín ...