Provable Security in the Real World

@article{Degabriele2011ProvableSI,
  title={Provable Security in the Real World},
  author={Jean Paul Degabriele and K. Paterson and G. J. Watson},
  journal={IEEE Security & Privacy},
  year={2011},
  volume={9},
  pages={33-41}
}
  • Jean Paul Degabriele, K. Paterson, G. J. Watson
  • Published 2011
  • Computer Science
  • IEEE Security & Privacy
  • Provable security plays an important role in the design and analysis of systems using cryptography. However, protocols can be vulnerable to attacks outside the scope of the existing formal analyses. 
    19 Citations

    Topics from this paper.

    High-Assurance Cryptography: Cryptographic Software We Can Trust
    • G. Barthe
    • Computer Science
    • IEEE Security & Privacy
    • 2015
    • 5
    Measuring Security
    • 62
    Another look at security definitions
    • 36
    • PDF
    miTLS: Verifying Protocol Implementations against Real-World Attacks
    • 12
    • PDF
    On post-handshake authentication and external PSKs in TLS 1.3
    A Framework For Fully-Simulatable h-Out-Of-n Oblivious Transfer
    • 8
    • PDF
    Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards
    • 73
    • PDF

    References

    SHOWING 1-10 OF 18 REFERENCES
    The Notion of Security for Probabilistic Cryptosystems
    • 184
    • PDF
    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
    • 33
    • PDF
    Probabilistic Encryption
    • 2,736
    • PDF
    Communication theory of secrecy systems
    • C. Shannon
    • Mathematics, Computer Science
    • Bell Syst. Tech. J.
    • 1949
    • 7,024
    • PDF
    Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
    • 887
    • PDF
    Plaintext Recovery Attacks against SSH
    • 99
    • PDF