Taming the Adversary

@inproceedings{Abadi2000TamingTA,
  title={Taming the Adversary},
  author={M. Abadi},
  booktitle={CRYPTO},
  year={2000}
}
  • M. Abadi
  • Published in CRYPTO 2000
  • Computer Science
  • While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the explanations are informal; others are embodied in formal methods, particularly in formal methods for the analysis of security protocols. This note (intended to accompany a talk at the Crypto 2000 conference) describes some of those explanations. It focuses on simple models of attacks, pointing to partial justifications of these… CONTINUE READING
    1 Citations
    Computationally Sound, Automated Proofs for Security Protocols
    • 149
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 43 REFERENCES
    Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*
    • 329
    On the security of public key protocols
    • D. Dolev, A. Yao
    • Computer Science
    • 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
    • 1981
    • 4,195
    • PDF
    Cryptographic protocols
    • 269
    • PDF
    A logic of authentication
    • 2,082
    • PDF
    Probabilistic Encryption
    • 2,736
    • PDF
    Theory and application of trapdoor functions
    • A. Yao
    • Computer Science
    • 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
    • 1982
    • 1,073
    Automated analysis of cryptographic protocols using Mur/spl phi/
    • 524
    Cryptographic Security of Reactive Systems
    • 79
    • PDF
    Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
    • G. Lowe
    • Computer Science
    • Softw. Concepts Tools
    • 1996
    • 1,410
    • PDF
    Authentication tests
    • J. Guttman, F. Thayer
    • Computer Science
    • Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
    • 2000
    • 79
    • PDF