Soundness of Formal Encryption in the Presence of Active Adversaries (original) (raw)

Computationally Sound, Automated Proofs for Security Protocols

Bogdan Warinschi

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries

Yassine Lakhnech

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Probabilistic Polynomial-Time Semantics for a Protocol Security Logic

Anupam Datta

2005

View PDFchevron_right

Logics of Knowledge and Cryptography: Completeness and Expressiveness

Prof. Olalekan Lekings Abdulrasheed Ogunjimi

Logics of Knowledge and Cryptography- Completeness and Expressiveness, 2013

View PDFchevron_right

Computational soundness without protocol restrictions

Ankit Malik

Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12, 2012

View PDFchevron_right

A Complete Axiomatization of Knowledge and Cryptography

Mads Dam

22nd Annual IEEE Symposium on Logic in Computer Science (LICS 2007), 2007

View PDFchevron_right

Towards Producing Formally Checkable Security Proofs, Automatically

Jean Goubault-larrecq

2008 21st IEEE Computer Security Foundations Symposium, 2008

View PDFchevron_right

Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols

Mitsuhiro Okada

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Inductive Proofs of Computational Secrecy

Anupam Datta

2007

View PDFchevron_right

Computationally Sound Compositional Logic for Key Exchange Protocols

Anupam Datta

2006

View PDFchevron_right

HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols

Yassine Lakhnech

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Inductive Proof Method for Computational Secrecy

Anupam Datta

View PDFchevron_right

On Symbolic Analysis of Cryptographic Protocols

Akshay Patil

2005

View PDFchevron_right

The inductive approach to verifying cryptographic protocols

Lawrence Paulson

View PDFchevron_right

Proving secrecy is easy enough

Harald Ruess

2001

View PDFchevron_right

Automated Proofs for Asymmetric Encryption

J. Courant, Yassine Lakhnech

Journal of Automated Reasoning, 2011

View PDFchevron_right

Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols

Mitsuhiro Okada

2010

View PDFchevron_right

Automated Proofs for Asymmetric Encryption: First results in the random oracle model

J. Courant, Yassine Lakhnech

2008

View PDFchevron_right

SECURITY ANALYSIS OF NETWORK PROTOCOLS: COMPOSITIONAL REASONING AND COMPLEXITY-THEORETIC FOUNDATIONS

Anupam Datta

2005

View PDFchevron_right

Sound Computational Interpretation of Formal Encryption with Composed Keys

Flavio Rosel garcia

Information Security and Cryptology - ICISC 2003, 2004

View PDFchevron_right

Proving secure properties of cryptographic protocols with knowledge based approach

maggie cheng

2005

View PDFchevron_right

Towards automated proofs for asymmetric encryption schemes in the random oracle model

J. Courant, Yassine Lakhnech

Proceedings of the 15th ACM conference on Computer and communications security - CCS '08, 2008

View PDFchevron_right

Computational Semantics for Basic Protocol Logic – A Stochastic Approach

Mitsuhiro Okada

Lecture Notes in Computer Science

View PDFchevron_right

Computationally complete symbolic attacker and key exchange

Mitsuhiro Okada

Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, 2013

View PDFchevron_right

Formal Methods and Cryptography

Birgit Pfitzmann

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Cryptographically Sound Theorem Proving

Birgit Pfitzmann

19th IEEE Computer Security Foundations Workshop (CSFW'06), 2006

View PDFchevron_right

On the Existence of an Effective and Complete Inference System for Cryptographic Protocols

Yassine Lakhnech

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Secrecy of cryptographic protocols under equational theory

Hanane Houmani, Hamido Fujita

Knowledge-Based Systems, 2009

View PDFchevron_right

Formal verification logic for hybrid security protocols

Thomas Newe

Computer Systems: Science & Engineering, 2003

View PDFchevron_right

Proving Properties of Security Protocols by Induction

Lawrence Paulson

1997

View PDFchevron_right

A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols

Hanane Houmani, Jaouhar Fattahi

View PDFchevron_right

Finite models for formal security proofs

Jean Goubault-larrecq

Journal of Computer Security, 2010

View PDFchevron_right

Approaches to Formal Verification of Security Protocols

Mohit Jain

Computing Research Repository, 2011

View PDFchevron_right

DELP: Dynamic Epistemic Logic for Security Protocols

Bogdan Macovei

arXiv (Cornell University), 2021

View PDFchevron_right