{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T10:56:08Z","timestamp":1777805768063,"version":"3.51.4"},"reference-count":0,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2010,8,16]],"date-time":"2010-08-16T00:00:00Z","timestamp":1281916800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2010,8,16]]},"abstract":"<jats:p>The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence depends on an underlying equational theory. The choice of an inappropriate equational theory can lead to overly pessimistic or overly optimistic notions of indistinguishability, and in turn to security criteria that require protection against impossible attacks or \u2013 worse yet \u2013 that ignore feasible ones. In this paper, we define and justify an equational theory for standard, fundamental cryptographic operations. This equational theory yields a notion of static equivalence that implies computational indistinguishability. Static equivalence remains liberal enough for use in applications. In particular, we develop and analyze a principled formal account of guessing attacks in terms of static equivalence.<\/jats:p>","DOI":"10.3233\/jcs-2009-0386","type":"journal-article","created":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T03:41:24Z","timestamp":1463542884000},"page":"909-968","source":"Crossref","is-referenced-by-count":4,"title":["Guessing attacks and the computational soundness of static equivalence"],"prefix":"10.1177","volume":"18","author":[{"given":"Mathieu","family":"Baudet","sequence":"first","affiliation":[{"name":"ANSSI, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bogdan","family":"Warinschi","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, UK"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mart\u00edn","family":"Abadi","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, CA, USA"},{"name":"Microsoft Research, Silicon Valley, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2010,8,16]]},"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-2009-0386","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-2009-0386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:44:16Z","timestamp":1777495456000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-2009-0386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,16]]},"references-count":0,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,8,16]]}},"alternative-id":["10.3233\/JCS-2009-0386"],"URL":"https:\/\/doi.org\/10.3233\/jcs-2009-0386","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"value":"0926-227X","type":"print"},{"value":"1875-8924","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,16]]}}}