Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference24 articles.
1. [1] K. Yoneyama, “Computational soundness of asymmetric bilinear pairing-based protocols,” ProvSec 2014, pp.317-325, 2014. 10.1007/978-3-319-12475-9_23
2. [2] D. Dolev and A.C.C. Yao, “On the security of public key protocols,” FOCS 1981, pp.350-357, IEEE, 1981. 10.1109/sfcs.1981.32
3. [3] M. Abadi and P. Rogaway, “Reconciling two views of cryptography (the computational soundness of formal encryption),” IFIP TCS 2000, LNCS1872, pp.3-22, Springer Verlag, 2000.
4. [4] M. Backes and B. Pfitzmann, “A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol,” FSTTCS 2003, pp.1-12, 2003.
5. [5] M. Backes, “A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol,” ESORICS 2004, pp.89-108, 2004. 10.1007/978-3-540-30108-0_6