<--- Back to Details
First PageDocument Content
Public-key cryptography / Electronic commerce / Advantage / XTR / Dolev-Yao model / RSA / CMAC / Ciphertext indistinguishability / Universal composability / Cryptography / Cryptographic protocols / Finite fields
Date: 2011-08-23 11:52:17
Public-key cryptography
Electronic commerce
Advantage
XTR
Dolev-Yao model
RSA
CMAC
Ciphertext indistinguishability
Universal composability
Cryptography
Cryptographic protocols
Finite fields

Modular Code-Based Cryptographic Verification Cédric Fournet Markulf Kohlweiss Pierre-Yves Strub

Add to Reading List

Source URL: research.microsoft.com

Download Document from Source Website

File Size: 227,59 KB

Share Document on Facebook

Similar Documents

ARA SSIA FormaCryptTwo models for the verification of cryptographic protocols: computational model formal, “Dolev-Yao” model enc(M,k

DocID: 1kKM1 - View Document

Failure / Cross-site scripting / Vulnerability / SQL injection / Fault injection / Dolev-Yao model / Model-based testing / Remote file inclusion / Code injection / Software testing / Cyberwarfare / Computer security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

DocID: 1grI1 - View Document

Security / Dolev-Yao model / Authentication protocol / Cryptography / Cryptographic nonce / Communications protocol / Authentication / Π-calculus / Cryptographic protocols / Data / Information

ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

DocID: 1fzE6 - View Document

Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

DocID: 128iO - View Document

Dolev-Yao model / Public-key cryptography / Email / Needham–Schroeder protocol / Cryptographic protocols / Cryptography / Computing

Verifying Security Protocols: An ASM Approach. Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn Lehrstuhl f¨ ur Softwaretechnik und Programmiersprachen Institut f¨

DocID: SEDH - View Document