Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Showing results for Limits of the BRAIN/UC soundness of Dolev-Yao-style XOR.
We show that it is not possible to extend the strong BRSIM/UC results to XOR, at least not with remotely the same general- ity and naturalness as for the core ...
Missing: BRAIN/ | Show results with:BRAIN/
Aug 10, 2007 · Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR for Int. J. Inf. Secur. by Michael Backes et al.
Missing: BRAIN/ | Show results with:BRAIN/
Recently significant progress was made in proving that DolevYao models can be sound with respect to actual cryptographic realizations and security definitions.
Missing: BRAIN/ | Show results with:BRAIN/
Nov 21, 2024 · We show that it is impossible to extend the strong BRSIM/UC results to usual Dolev-Yao models of hash functions in the general case. These ...
Missing: BRAIN/ | Show results with:BRAIN/
Sep 21, 2008 · Limits of the cryptographic realization of Dolev-Yao-style XOR. In. Proc. 10th ESORICS, volume 3679 of LNCS, pages 178–196. Springer, 2005 ...
Missing: BRAIN/ | Show results with:BRAIN/
Our work on impossibility was motivated by trying to add XOR and hashing to the BRSIM/UC soundness results, and being unsuccessful even if we were willing to ...
Missing: BRAIN/ | Show results with:BRAIN/
We show that it is impossible to extend the strong soundness results to XOR, at least not with remotely the same generality and naturalness as for the core ...
Missing: BRAIN/ | Show results with:BRAIN/
Jun 20, 2006 · We do obtain BRSIM/UC-style soundness, e.g., for hashing in the random oracle model and for XOR in the passive case. However, we do not find ...
Missing: BRAIN/ | Show results with:BRAIN/
The soundness of Dolev-Yao models with respect to real cryptographic security definitions has received significant attention in the last years. Until recently, ...
Missing: BRAIN/ | Show results with:BRAIN/
In this work, we present a generic framework for constructing efficient signature schemes, ring signature schemes, and identity based encryption schemes.