×

Found 14 Documents (Results 1–14)

Secrecy without perfect randomness: cryptography with (bounded) weak sources. (English) Zbl 1423.94047

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 675-695 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

OAEP is secure under key-dependent messages. (English) Zbl 1206.94050

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 506-523 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Limits of constructive security proofs. (English) Zbl 1206.94051

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 290-307 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On simulatability soundness and mapping soundness of symbolic cryptography. (English) Zbl 1135.94325

Arvind, V. (ed.) et al., FSTTCS 2007: Foundations of software technology and theoretical computer science. 27th international conference, New Delhi, India, December 12–14, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77049-7/pbk). Lecture Notes in Computer Science 4855, 108-120 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Conditional reactive simulatability. (English) Zbl 1487.94100

Gollmann, Dieter (ed.) et al., Computer security – ESORICS 2006. 11th European symposium on research in computer security, Hamburg, Germany, September 18–20, 2006. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 4189, 424-443 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes. (English) Zbl 1487.94102

Gollmann, Dieter (ed.) et al., Computer security – ESORICS 2006. 11th European symposium on research in computer security, Hamburg, Germany, September 18–20, 2006. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 4189, 404-423 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptographically sound security proofs for basic and public-key Kerberos. (English) Zbl 1487.94149

Gollmann, Dieter (ed.) et al., Computer security – ESORICS 2006. 11th European symposium on research in computer security, Hamburg, Germany, September 18–20, 2006. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 4189, 362-383 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Quantifying probabilistic information flow in computational reactive systems. (English) Zbl 1487.68052

de Capitani di Vimercati, Sabrina (ed.) et al., Computer security – ESORICS 2005. 10th European symposium on research in computer security, Milan, Italy, September 12–14, 2005. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 3679, 336-354 (2005).
MSC:  68M25 68M10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Limits of the cryptographic realization of Dolev-Yao-style XOR. (English) Zbl 1487.94101

de Capitani di Vimercati, Sabrina (ed.) et al., Computer security – ESORICS 2005. 10th European symposium on research in computer security, Milan, Italy, September 12–14, 2005. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 3679, 178-196 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol. (English) Zbl 1487.94099

Samarati, Pierangela (ed.) et al., Computer security – ESORICS 2004. 9th European symposium on research in computer security, Sophia Antipolis, France, September 13–15, 2004. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 3193, 89-108 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computational probabilistic non-interference. (English) Zbl 1482.68065

Gollmann, Dieter (ed.) et al., Computer security – ESORICS 2002. 7th European symposium on research in computer security, Zurich, Switzerland, October 14–16, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2502, 1-23 (2002).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software