@COMMENT This file was generated by bib2html.pl <https://sourceforge.net/projects/bib2html/> version 0.94
@COMMENT written by Patrick Riley <http://sourceforge.net/users/patstg/>
@article{BCK-IC09,
  author =        {Baudet, Mathieu and Cortier, V{\'e}ronique and
                   Kremer, Steve},
  journal =       {Information and Computation},
  month =         apr,
  number =        {4},
  pages =         {496-520},
  publisher =     {Elsevier Science Publishers},
  title =         {Computationally Sound Implementations of Equational
                   Theories against Passive Adversaries},
  volume =        {207},
  year =          {2009},
  abstract =      {In~this paper we study the link between formal and
                   cryptographic models for security protocols in the
                   presence of passive adversaries. In~contrast to other
                   works, we~do not consider a fixed set of primitives
                   but aim at results for arbitrary equational theories.
                   We~define a framework for comparing a cryptographic
                   implementation and its idealization with respect to
                   various security notions. In~particular, we
                   concentrate on the computational soundness of static
                   equivalence, a standard tool in cryptographic pi
                   calculi. We~present a soundness criterion, which for
                   many theories is not only sufficient but also
                   necessary. Finally, to~illustrate our framework,
                   we~establish the soundness of static equivalence for
                   the exclusive OR and a theory of ciphers and lists.},
  doi =           {10.1016/j.ic.2008.12.005},
}
