A modular treatment of cryptographic APIs: the symmetric-key case
From MaRDI portal
Publication:2835591
Recommendations
- A generic security API for symmetric key management on cryptographic devices
- A provably secure PKCS\#11 configuration without authenticated attributes
- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
- scientific article; zbMATH DE number 2092644
Cites work
- scientific article; zbMATH DE number 1256784 (Why is no real title available?)
- scientific article; zbMATH DE number 1942416 (Why is no real title available?)
- scientific article; zbMATH DE number 1882021 (Why is no real title available?)
- A Provable-Security Treatment of the Key-Wrap Problem
- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data
- Automatic Analysis of the Security of XOR-Based Key Management Schemes
- Efficient padding oracle attacks on cryptographic hardware
- GNUC: a new universal composability framework
- More on key wrapping
- On the security of PKCS \#11.
- Towards unconditional soundness: computationally complete symbolic attacker
Cited in
(7)- scientific article; zbMATH DE number 2092644 (Why is no real title available?)
- Security in the presence of key reuse: context-separable interfaces and their applications
- An introduction to security API analysis
- On the security of PKCS \#11.
- Type-based analysis of PKCS\#11 key management
- A provably secure PKCS\#11 configuration without authenticated attributes
- A generic security API for symmetric key management on cryptographic devices
This page was built for publication: A modular treatment of cryptographic APIs: the symmetric-key case
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835591)