Abstract—For most basic cryptographic tasks, such as public-key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities have been formulated in the simulation-based security approach, along with their realizations. Surprisingly, however, no such functionality exists for symmetric encryption, except for a more abstract Dolev-Yao style functionality. In this paper, we fill this gap. We propose two functionalities for sym-metric encryption, an unauthenticated and an authenticated version, and show that they can be implemented based on standard cryptographic assumptions for symmetric encryption schemes, namely IND-CCA security and authenticated encryp-tion, respectively, provi...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communicatio...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, DNSSEC, IEEE 802.11i, and Kerberos...
In the present work we investigate into security proofs techniques in symmetric cryptography with ai...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
Abstract. Symbolic and computational models are the two families of models for rigorously analysing ...
Formal analysis of security protocols based on symbolic mod-els has been very successful in finding ...
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security frame...
International audienceTriggered by the increasing deployment of embedded cryptographic devices (e.g....
International audienceTriggered by the increasing deployment of embedded cryptographic devices (e.g....
In this paper we examine composability properties for the fundamental task of key exchange. Roughly ...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communicatio...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, DNSSEC, IEEE 802.11i, and Kerberos...
In the present work we investigate into security proofs techniques in symmetric cryptography with ai...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
Abstract. Symbolic and computational models are the two families of models for rigorously analysing ...
Formal analysis of security protocols based on symbolic mod-els has been very successful in finding ...
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security frame...
International audienceTriggered by the increasing deployment of embedded cryptographic devices (e.g....
International audienceTriggered by the increasing deployment of embedded cryptographic devices (e.g....
In this paper we examine composability properties for the fundamental task of key exchange. Roughly ...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communicatio...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...