Sciweavers

199 search results - page 19 / 40
» A survey of algebraic properties used in cryptographic proto...
Sort
View
LOGCOM
2010
158views more  LOGCOM 2010»
14 years 8 months ago
Applying Universal Algebra to Lambda Calculus
The aim of this paper is double. From one side we survey the knowledge we have acquired these last ten years about the lattice of all λ-theories (= equational extensions of untype...
Giulio Manzonetto, Antonino Salibra
TCS
2008
14 years 9 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
85
Voted
CAI
2011
Springer
14 years 1 months ago
Theme and Variations on the Concatenation Product
Abstract. The concatenation product is one of the most important operations on regular languages. Its study requires sophisticated tools from algebra, finite model theory and pro...
Jean-Éric Pin
77
Voted
ICALP
2005
Springer
15 years 3 months ago
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
15 years 1 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider