@COMMENT This file was generated by bib2html.pl version 0.94
@COMMENT written by Patrick Riley
@inproceedings{BCK-ICALP2005,
address = {Lisboa, Portugal},
author = {Baudet, Mathieu and Cortier, V{\'e}ronique and
Kremer,Steve},
booktitle = {{P}roceedings of the 32nd {I}nternational
{C}olloquium on {A}utomata, {L}anguages and
{P}rogramming ({ICALP}'05)},
editor = {Caires, Lu{\'\i}s and Italiano, Giuseppe F. and
Monteiro, Lu{\'\i}s and Palamidessi, Catuscia and
Yung, Moti},
month = jul,
pages = {652-663},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
title = {Computationally Sound Implementations of Equational
Theories against Passive Adversaries},
volume = {3580},
year = {2005},
abstract = {In this paper we study the link between formal and
cryptographic models for security protocols in the
presence of a passive adversary. In contrast to other
works, we do not consider a fixed set of primitives
but aim at results for an arbitrary equational
theory. We define a framework for comparing a
cryptographic implementation and its idealization
w.r.t.\ various security notions. In particular, we
concentrate on the computationnal soundness of static
equivalence, a standard tool in cryptographic
\(\pi\)-calculi. We present a soundness criterion,
which for many theories is not only sufficient but
also necessary. Finally, we establish new soundness
results for the Exclusive Or, as well as a theory of
ciphers and lists.},
doi = {10.1007/11523468_53},
}