A modular treatment of cryptographic APIs: the symmetric-key case
From MaRDI portal
Publication:2835591
DOI10.1007/978-3-662-53018-4_11zbMATH Open1378.94063OpenAlexW2506192635MaRDI QIDQ2835591FDOQ2835591
Authors: Martijn Stam, Bogdan Warinschi, Thomas Shrimpton
Publication date: 30 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: http://ia.cr/2016/586
Recommendations
- A generic security API for symmetric key management on cryptographic devices
- A provably secure PKCS\#11 configuration without authenticated attributes
- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
- scientific article; zbMATH DE number 2092644
Cites Work
- GNUC: a new universal composability framework
- A Provable-Security Treatment of the Key-Wrap Problem
- Title not available (Why is that?)
- Title not available (Why is that?)
- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data
- Title not available (Why is that?)
- On the security of PKCS \#11.
- Automatic Analysis of the Security of XOR-Based Key Management Schemes
- Towards unconditional soundness: computationally complete symbolic attacker
- Efficient padding oracle attacks on cryptographic hardware
- More on key wrapping
Cited In (7)
- An introduction to security API analysis
- Type-based analysis of PKCS\#11 key management
- Title not available (Why is that?)
- A provably secure PKCS\#11 configuration without authenticated attributes
- A generic security API for symmetric key management on cryptographic devices
- Security in the presence of key reuse: context-separable interfaces and their applications
- On the security of PKCS \#11.
Uses Software
This page was built for publication: A modular treatment of cryptographic APIs: the symmetric-key case
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835591)