{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:08:59Z","timestamp":1725548939192},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540236351"},{"type":"electronic","value":"9783540376217"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-37621-7_5","type":"book-chapter","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:29:47Z","timestamp":1267403387000},"page":"87-112","source":"Crossref","is-referenced-by-count":5,"title":["A Formal System for Analysis of Cryptographic Encryption and Their Security Properties"],"prefix":"10.1007","author":[{"given":"Ashraf","family":"Bhery","sequence":"first","affiliation":[]},{"given":"Shigeki","family":"Hagihara","sequence":"additional","affiliation":[]},{"given":"Naoki","family":"Yonezaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Bhery, A., Hagihara, S., Yonezaki, N.: A new deduction system of cryptographic primitives and their security properties. Information Processing Society of Japan (IPSJ 2003), SIG technical reports vol.\u00a02003(74) (2003)"},{"key":"5_CR2","unstructured":"Bhery, A., Hagihara, S., Yonezaki, N.: Judgment deduction system of asymmetric encryption scheme (JDE-system). In: WISA 2003 proceeding. The 4Th International Workshop on Information Security Applications (WISA 2003), Korea (2003)"},{"key":"5_CR3","unstructured":"Bhery, A., Hagihara, S., Yonezaki, N.: A formal system for analysis of cryptographic primitives and their security properties. In: Proceeding of 20th annual conference. Japan Society for Software and Technology (JSST 2003), Japan (2003)"},{"key":"5_CR4","unstructured":"Bhery, A., Hagihara, S., Yonezaki, N.: The characterization of cryptographic primitives and their security properties. In: The 2003 International Workshop on Cryptography and Network Security (CANS 2003), USA (DMS 2003) (2003)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Schunter, M., Waidner, M.: Cryptographic security of reactive systems (extended abstract). Electronic Notes in Theoretical Computer Science, vol.\u00a032 (April 2000)","DOI":"10.1016\/S1571-0661(04)00095-7"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Bolignano, D.: An approach to the formal verification of cryptographic protocols. In: Proceeding of the 3rd ACM Conference on Communications and Computer Security (CCS 1996), pp. 106\u2013118 (1996)","DOI":"10.1145\/238168.238196"},{"key":"5_CR7","volume-title":"Proceeding of the 33rd Annual ACM Symposium on the Theory of Computing","author":"D. Dolev","year":"1991","unstructured":"Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: Proceeding of the 33rd Annual ACM Symposium on the Theory of Computing. ACM Press, New York (1991)"},{"issue":"12","key":"5_CR8","first-page":"189","volume":"IT-29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, C.: On the security of public key protocols. IEEE Transactions and Information Theory\u00a0IT-29(12), 189\u2013208 (1983)","journal-title":"IEEE Transactions and Information Theory"},{"key":"5_CR9","unstructured":"Stinson, D.R.: Cryptography theory and practice. 2nd edn. Chapman&Hall\/CRC (2002)"},{"key":"5_CR10","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Proceedings of 10th IEEE Computer Security Foundations Workshop, pp. 45\u201358 (1997)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Katz, J., Yung, M.: Complete characterization of security notions for probabilistic private-key encryption. In: Proceedings of the thirty-second annual ACM symposium on Theory of computation (May 1999)","DOI":"10.1145\/335305.335335"},{"issue":"1-2","key":"5_CR12","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06(1-2), 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/3-540-44929-9_1","volume-title":"Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics","author":"M. Abadi","year":"2000","unstructured":"Abadi, M., Rogaway, P.: Reconciling two views of cryptography: The computational soundness of formal encryption. In: Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, vol.\u00a01872, p. 3. Springer, Heidelberg (2000)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The Spi calculus. In: Proceedings of the Fourth ACM Conference on Computer and Communications Security, pp. 36\u201347 (1997)","DOI":"10.1145\/266420.266432"},{"issue":"4","key":"5_CR15","first-page":"267","volume":"5","author":"M. Abadi","year":"1998","unstructured":"Abadi, M., Gordon, A.D.: A bisimulation method for cryptographic protocols: The Spi calculus. Nordic Journal of Computing\u00a05(4), 267\u2013303 (winter, 1998)","journal-title":"Nordic Journal of Computing"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 26\u201345. Springer, Heidelberg (1998)"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/3-540-48405-1_33","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Bellare","year":"1999","unstructured":"Bellare, M., Sahai, A.: Non-malleability encryption: equivalence between two notions, and an indistinguishability-based characterization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, p. 519. Springer, Heidelberg (1999)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38 Annual Symposium on Foundations of Computer Science, pp. 394\u2013403 (1997)","DOI":"10.1109\/SFCS.1997.646128"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proceedings of the Royal Society of London A\u00a0426, 233\u2013271 (1989)","journal-title":"Proceedings of the Royal Society of London A"},{"key":"5_CR21","volume-title":"Foundations of cryptography: basic tool","author":"O. Goldreich","year":"2000","unstructured":"Goldreich, O.: Foundations of cryptography: basic tool. Cambridge University Press, Cambridge (2000)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Lincoln, P., Mitchell, J., Mitchell, M., Scedrov, A.: A probabilistic poly-time framework for protocol analysis. In: Proceedings of the Fifth ACM Conference on Computer and Communications Security, pp. 112\u2013121 (1998)","DOI":"10.1145\/288090.288117"},{"key":"5_CR23","volume-title":"Modelling and analysis of security protocols","author":"P. Ryan","year":"2001","unstructured":"Ryan, P., Schneider, S.: Modelling and analysis of security protocols. Addison Wesley, Reading (2001)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Kemmerer, R., Meadows, C., Millen, J.: Three systems for cryptographic protocol analysis. Journal of Cryptography 7(2) (1994)","DOI":"10.1007\/BF00197942"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Science\u00a028, 270\u2013299 (1984)","journal-title":"Journal of Computer and System Science"},{"key":"#cr-split#-5_CR26.1","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof Systems. SIAM Journal on Computing??18(2), 186???208 (1985);","DOI":"10.1137\/0218012"},{"key":"#cr-split#-5_CR26.2","doi-asserted-by":"crossref","unstructured":"Earlier version in Proc. of the 17th STOC 1985, pp. 291???305 (1985)","DOI":"10.25291\/VR\/1985-VR-305"},{"key":"5_CR27","unstructured":"Goldwasser, S., Bellare, M.: Lecture notes on cryptography (August 1999), http:\/\/www.cs.columbia.edu\/~jkatz\/crypto\/readings.html"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Micali, S., Rackoff, C., Sloan, B.: The notion of security for probabilistic cryptosystem. SIAM Journal of computing (April 1988)","DOI":"10.1137\/0217025"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Schneider, S.: Security Properties and CSP. In: IEEE Symposium on Security and Privacy, pp. 174\u2013187 (1996)","DOI":"10.1109\/SECPRI.1996.502680"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Woo, T.Y.C., Lam, S.S.: A semantic model for authentication protocols. In: Proceedings IEEE Symposium on Research in Security and Privacy, Oakland, CA (May 1993)","DOI":"10.1109\/RISP.1993.287633"}],"container-title":["Lecture Notes in Computer Science","Software Security - Theories and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-37621-7_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:40:55Z","timestamp":1605760855000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-37621-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540236351","9783540376217"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-37621-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}