We consider expansions of the Abadi-Rogaway logic of indistinguishability of formal cryptographic expressions. We expand the logic in order to cover cases when par-tial information of the encrypted plaintext is revealed. We consider not only computational, but also purely probabilistic, information-theoretic interpretations. We present a general, systematic treatment of the expansions of the logic for symmetric encryption. We establish gen-eral soundness and completeness theorems for the inter-pretations. We also present applications to specific set-tings not covered in earlier works: a purely probabilistic one based on One-Time Pad, and computational settings of the so-called type-2 (which-key revealing) and type-3 (which-key and length re...
We study an extension of the well-known Abadi-Rogaway logic with hashes. Previously, we have given ...
Formal analysis of security protocols based on symbolic mod-els has been very successful in finding ...
Cette thèse se propose de remédier à l'absence de formalisme dédié aux preuves de sécurité concrète ...
In the last two decades, two major directions in cryptography have developed: formal and computation...
We formalize Abadi and Rogaway's computational soundness result in the Coq interactive theorem prove...
This paper provides one more step towards bridging the gap between the formal and computational appr...
This paper provides one more step towards bridging the gap between the formal and computational appr...
Computational soundness results show that under certain conditions it is possible to conclude comput...
AbstractThis paper provides one more step towards bridging the gap between the formal and computatio...
The formal and computational views of cryptography have been related by the seminal work of Abadi an...
1 Introduction In the past few years, significant effort has been made to link formal and compu-tati...
International audienceThere are two main frameworks for analyzing cryptographic systems; the symboli...
Abstract. The formal and computational views of cryptography have been related by the seminal work o...
In this thesis, we address the lack of formalisms to carry out concrete security proofs. Our contrib...
This paper provides one more step towards bridging the gap between the formal and computational appr...
We study an extension of the well-known Abadi-Rogaway logic with hashes. Previously, we have given ...
Formal analysis of security protocols based on symbolic mod-els has been very successful in finding ...
Cette thèse se propose de remédier à l'absence de formalisme dédié aux preuves de sécurité concrète ...
In the last two decades, two major directions in cryptography have developed: formal and computation...
We formalize Abadi and Rogaway's computational soundness result in the Coq interactive theorem prove...
This paper provides one more step towards bridging the gap between the formal and computational appr...
This paper provides one more step towards bridging the gap between the formal and computational appr...
Computational soundness results show that under certain conditions it is possible to conclude comput...
AbstractThis paper provides one more step towards bridging the gap between the formal and computatio...
The formal and computational views of cryptography have been related by the seminal work of Abadi an...
1 Introduction In the past few years, significant effort has been made to link formal and compu-tati...
International audienceThere are two main frameworks for analyzing cryptographic systems; the symboli...
Abstract. The formal and computational views of cryptography have been related by the seminal work o...
In this thesis, we address the lack of formalisms to carry out concrete security proofs. Our contrib...
This paper provides one more step towards bridging the gap between the formal and computational appr...
We study an extension of the well-known Abadi-Rogaway logic with hashes. Previously, we have given ...
Formal analysis of security protocols based on symbolic mod-els has been very successful in finding ...
Cette thèse se propose de remédier à l'absence de formalisme dédié aux preuves de sécurité concrète ...