Formal Eavesdropping and Its Computational Interpretation, Proceedings of the Fourth International Symposium on Theoretical Aspects of Computer Software (TACS'01), volume 2215 of Lecture Notes in Computer Science, pp.82-94, 2001. ,
DOI : 10.1007/3-540-45500-0_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.1076
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*, Journal of Cryptology, vol.15, issue.2, pp.103-127, 2002. ,
DOI : 10.1007/s00145-001-0014-7
Limits of the reactive simulatability/UC of Dolev-Yao models with hashes. Cryptology ePrint Archive Random oracles are practical: A paradigm for designing efficient protocols, Proceedings of the 1st ACM CCS, pp.62-73, 1993. ,
Towards realizing random oracles: Hash functions that hide all partial information, Advances in Cryptology, 17th Annual International Cryptology Conference (CRYPTO'97, pp.455-469, 1997. ,
DOI : 10.1007/BFb0052255
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.5404
Towards realizing random oracles: Hash functions that hide all partial information, Cryptology ePrint Archive, p.7, 1997. ,
DOI : 10.1007/BFb0052255
Perfectly one-way probabilistic hash functions (preliminary version), Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.131-140, 1998. ,
DOI : 10.1145/276698.276721
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.44.7681
On the security of public key protocols, Gol01] Oded Goldreich. Foundations of Cryptography, pp.198-208, 1983. ,
DOI : 10.1109/TIT.1983.1056650
Completeness of formal hashes in the standard model, Cryptology ePrint Archive Report, vol.146, issue.146, 2006. ,
Sound computational interpretation of formal hashes. Cryptology ePrint Archive, Report, p.14, 2006. ,
A computational interpretation of Dolev???Yao adversaries, Theoretical Computer Science, vol.340, issue.1, pp.57-81, 2005. ,
DOI : 10.1016/j.tcs.2005.03.003
Adaptive Security of Symbolic Encryption, Theory of Cryptography: Second Theory of Cryptography Conference (TCC'05), pp.169-187, 2005. ,
DOI : 10.1007/978-3-540-30576-7_10
Completeness theorems for the Abadi???Rogaway language of encrypted expressions1, PW00] Birgit Pfitzmann and Michael Waidner Proceedings of the 7th ACM CCS Fast Software Encryption: 11th International Workshop, pp.99-129, 2000. ,
DOI : 10.3233/JCS-2004-12105