Automated proofs of block cipher modes of operation
DOI10.1007/S10817-015-9341-5zbMATH Open1356.68188OpenAlexW2252292714WikidataQ113901248 ScholiaQ113901248MaRDI QIDQ287326FDOQ287326
Authors: Martin Gagné, Pascal Lafourcade, Reihaneh Safavi-Naini, Yassine Lakhnech
Publication date: 26 May 2016
Published in: Journal of Automated Reasoning (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10817-015-9341-5
Recommendations
- Automated verification of block cipher modes of operation, an improved method
- Automated security proof for symmetric encryption modes
- Automated proofs for asymmetric encryption
- Automated proofs for asymmetric encryption
- scientific article; zbMATH DE number 2086169
- On modes of operations of a block cipher for authentication and authenticated encryption
- Automated verification of equivalence properties of cryptographic protocols
- Automated verification of equivalence properties of cryptographic protocols
Cryptography (94A60) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30) Logic in computer science (03B70)
Cites Work
- Title not available (Why is that?)
- Automated proofs of block cipher modes of operation
- Automated verification of block cipher modes of operation, an improved method
- Title not available (Why is that?)
- On the equality of probabilistic terms
- Beyond provable security verifiable IND-CCA security of OAEP
- An Improved Security Bound for HCTR
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Invertible Universal Hashing and the TET Encryption Mode
- A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
- Automated security proof for symmetric encryption modes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Computer-Aided Security Proofs for the Working Cryptographer
- Advances in Cryptology - CRYPTO 2003
- The Security of the Extended Codebook (XCB) Mode of Operation
- Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
- Information Security
- Progress in Cryptology - INDOCRYPT 2004
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
- Automated Security Proofs with Sequences of Games
- Topics in Cryptology – CT-RSA 2004
- The security of the cipher block chaining message authentication code
Cited In (5)
Uses Software
This page was built for publication: Automated proofs of block cipher modes of operation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q287326)