Reconciling two views of cryptography (The computational soundness of formal encryption)

From MaRDI portal
Publication:1601823

DOI10.1007/s00145-001-0014-7zbMath0994.68066OpenAlexW3031048092MaRDI QIDQ1601823

Phillip Rogaway, Martín Abadi

Publication date: 27 June 2002

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-001-0014-7




Related Items

Bayesian Authentication: Quantifying Security of the Hancke-Kuhn ProtocolOn the semantics of Alice \& Bob specifications of security protocolsA game-theoretic framework for specification and verification of cryptographic protocolsEmerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years LaterKDM security for the Fujisaki-Okamoto transformations in the QROMTo know or not to know: Epistemic approaches to security protocol verificationUniversally composable symbolic security analysisNew models and methods for estimating the cryptographic strength of information security systemsUnnamed ItemCryptographic transformations of non-Shannon sources of informationAn omniscience-free temporal logic of knowledge for verifying authentication protocolsThe design and evolution of OCBCryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptographySound and complete computational interpretation of symbolic hashes in the standard modelComputationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairingsFormal Abstractions for Attested Execution Secure ProcessorsA survey of symbolic methods in computational analysis of cryptographic systemsLogics for reasoning about cryptographic constructionsThe RSA group is pseudo-freeA computational interpretation of Dolev-Yao adversariesThe Layered Games Framework for Specifications and Analysis of Security ProtocolsProbabilistic Functions and Cryptographic Oracles in Higher Order LogicMeasure Transformer Semantics for Bayesian Machine LearningTowards Key-Dependent Message Security in the Standard ModelFormalisation of Bayesian concealmentComputational Semantics for First-Order Logical Analysis of Cryptographic ProtocolsComputationally Sound Formalization of Rerandomizable RCCA Secure EncryptionAnalyzing security protocols using time-bounded task-PIOAsSoundness of Formal Encryption in the Presence of Key-Cycles




This page was built for publication: Reconciling two views of cryptography (The computational soundness of formal encryption)