Sciweavers

4340 search results - page 2 / 868
» Formal Methods and Cryptography
Sort
View
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
13 years 10 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
TOCL
2012
241views Formal Methods» more  TOCL 2012»
11 years 7 months ago
Model Checking of Recursive Probabilistic Systems
Kousha Etessami, Mihalis Yannakakis
FSE
2009
Springer
143views Cryptology» more  FSE 2009»
13 years 11 months ago
New Distinguishing Attack on MAC Using Secret-Prefix Method
Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang