Project: Computational Interpretation of Symbolic Security Analysis

  1. D. Micciancio, B. Warinschi
    Completeness theorems for the Abadi-Rogaway logic of encrypted expressions

    Journal of Computer Security, 12(1), pp. 99-129, 2004. (Preliminary version in WITS 2002)

  2. D. Micciancio, B. Warinschi
    Soundness of Formal Encryption in the presence of Active Adversaries

    Theory of Cryptography Conference - TCC 2004. Cambridge, MA, USA. February 2004. LNCS 2951, Springer, pp. 133-151.

  3. D. Micciancio, S. Panjwani
    Adaptive security of symbolic encryption
    Theory of cryptography Conference - TCC 2005. Cambridge, MA, USA. February 2005. LNCS 3378, Springer, pp. 169-187.

  4. D. Micciancio, S. Panjwani
    Corrupting one vs. corrupting many: the case of broadcast and multicast encryption
    International Colloquium on Automata, Languages and Programming - ICALP  2006, Venice, Italy. To  appear.