Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

Hybrid consensus: Efficient consensus in the permissionless model

R Pass, E Shi - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Consensus, or state machine replication is a foundational building block of distributed
systems and modern cryptography. Consensus in the classical, permissioned setting has …

Universally composable security: A new paradigm for cryptographic protocols

R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …

A computationally sound mechanized prover for security protocols

B Blanchet - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
We present a new mechanized prover for secrecy properties of security protocols. In contrast
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …

Universally composable signature, certification, and authentication

R Canetti - Proceedings. 17th IEEE Computer Security …, 2004 - ieeexplore.ieee.org
Recently some efforts were made towards capturing the security requirements from digital
signature schemes as an ideal functionality within a composable security framework. This …

Formal abstractions for attested execution secure processors

R Pass, E Shi, F Tramer - … in Cryptology–EUROCRYPT 2017: 36th Annual …, 2017 - Springer
Realistic secure processors, including those built for academic and commercial purposes,
commonly realize an “attested execution” abstraction. Despite being the de facto standard …

An introduction to morphological neural networks

GX Ritter, P Sussner - Proceedings of 13th International …, 1996 - ieeexplore.ieee.org
The theory of artificial neural networks has been successfully applied to a wide variety of
pattern recognition problems. In this paper we introduce a novel class of neural networks …

Bounded key-dependent message security

B Barak, I Haitner, D Hofheinz, Y Ishai - … on the Theory and Applications of …, 2010 - Springer
We construct the first public-key encryption scheme that is proven secure (in the standard
model, under standard assumptions) even when the attacker gets access to encryptions of …

A survey of symbolic methods in computational analysis of cryptographic systems

V Cortier, S Kremer, B Warinschi - Journal of Automated Reasoning, 2011 - Springer
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …

The reactive simulatability (RSIM) framework for asynchronous systems

M Backes, B Pfitzmann, M Waidner - Information and Computation, 2007 - Elsevier
We define reactive simulatability for general asynchronous systems. Roughly, simulatability
means that a real system implements an ideal system (specification) in a way that preserves …