Sciweavers

96 search results - page 1 / 20
» A Survey of Symbolic Methods in Computational Analysis of Cr...
Sort
View
JAR
2011
49views more  JAR 2011»
12 years 10 months ago
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
Véronique Cortier, Steve Kremer, Bogdan War...
ICALP
2001
Springer
13 years 7 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
JCS
2010
121views more  JCS 2010»
13 years 1 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
CCS
2005
ACM
13 years 8 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 3 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi