Cryptographic Security Definitions
and Analysis
Publications:
- R. Küsters,
A. Datta, J. C. Mitchell,
A. Ramanathan, On the Relationships between Notions
of Simulation-based Security, J.
Cryptology 21(4): 492-546 (2008) [ Paper ]
- A. Datta, A. Derek, J. C. Mitchell,
A. Ramanathan, A. Scedrov,
Games and the Impossibility of Realizable Ideal Functionality, in Proceedings
of Theory of Cryptography Conference, pp. 360-379, March 2006. [ Paper ]
- A. Datta, R. Küsters,
J. C. Mitchell,
A. Ramanathan, On the Relationships between Notions
of Simulation-based Security, in Proceedings of Theory of Cryptography
Conference, Lecture Notes in Computer Science, Vol. 3378, pp. 476-494,
February 2005. [ Paper ]
- A. Datta, R. Küsters,
J. C. Mitchell,
A. Ramanathan, V. Shmatikov,
Unifying Equivalence-Based Definitions of Protocol Security, in Proceedings
of ACM SIGPLAN and IFIP WG 1.7 4th Workshop on Issues in the Theory
of Security, April 2004. [ Paper ]