Soundness of Formal Encryption in the Presence of Key-Cycles
From MaRDI portal
Publication:5862672
DOI10.1007/11555827_22zbMath1487.94097OpenAlexW1492390108MaRDI QIDQ5862672
Gergei Bana, Jonathan Herzog, Pedro Adão, Andrej Scedrov
Publication date: 9 March 2022
Published in: Computer Security – ESORICS 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11555827_22
Related Items
CPA-to-CCA transformation for KDM security ⋮ Universally composable symbolic security analysis ⋮ Circular security is complete for KDM security ⋮ KDM security for identity-based encryption: constructions and separations ⋮ Sound and complete computational interpretation of symbolic hashes in the standard model ⋮ Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings ⋮ Towards Key-Dependent Message Security in the Standard Model ⋮ Computationally sound implementations of equational theories against passive adversaries ⋮ Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- Security and composition of multiparty cryptographic protocols
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
- Logics for reasoning about cryptographic constructions
- The Notion of Security for Probabilistic Cryptosystems
- On the security of public key protocols
- Symmetric Authentication within a Simulatable Cryptographic Library
- FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
- Programming Languages and Systems
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Theory of Cryptography
- Theory of Cryptography
- Information Security and Cryptology - ICISC 2003
- Automata, Languages and Programming
- Automata, Languages and Programming
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Soundness of Formal Encryption in the Presence of Key-Cycles