Automated proofs of block cipher modes of operation
From MaRDI portal
Publication:287326
DOI10.1007/s10817-015-9341-5zbMath1356.68188OpenAlexW2252292714WikidataQ113901248 ScholiaQ113901248MaRDI QIDQ287326
Martin Gagné, Pascal Lafourcade, Reihaneh Safavi-Naini, Yassine Lakhneche
Publication date: 26 May 2016
Published in: Journal of Automated Reasoning (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10817-015-9341-5
Cryptography (94A60) Logic in computer science (03B70) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Related Items
Automated proofs of block cipher modes of operation, Moving the bar on computationally sound exclusive-or
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Automated proofs of block cipher modes of operation
- Automated Verification of Block Cipher Modes of Operation, an Improved Method
- On the Equality of Probabilistic Terms
- Beyond Provable Security Verifiable IND-CCA Security of OAEP
- An Improved Security Bound for HCTR
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Invertible Universal Hashing and the TET Encryption Mode
- A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
- Automated Security Proof for Symmetric Encryption Modes
- Computer-Aided Security Proofs for the Working Cryptographer
- Advances in Cryptology - CRYPTO 2003
- The Security of the Extended Codebook (XCB) Mode of Operation
- Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
- Information Security
- Progress in Cryptology - INDOCRYPT 2004
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
- Automated Security Proofs with Sequences of Games
- Topics in Cryptology – CT-RSA 2004
- The security of the cipher block chaining message authentication code