{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:40:48Z","timestamp":1725543648806},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540359074"},{"type":"electronic","value":"9783540359081"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11787006_22","type":"book-chapter","created":{"date-parts":[[2006,6,28]],"date-time":"2006-06-28T23:23:09Z","timestamp":1151536989000},"page":"252-263","source":"Crossref","is-referenced-by-count":29,"title":["A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs"],"prefix":"10.1007","author":[{"given":"Ricardo","family":"Corin","sequence":"first","affiliation":[]},{"given":"Jerry","family":"den Hartog","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/11783596_6","volume-title":"Mathematics of Program Construction","author":"C. Paulin-Mohring","year":"2006","unstructured":"Paulin-Mohring, C., Audebaud, P.: Proofs of Randomized Algorithms in Coq. In: Uustalu, T. (ed.) MPC 2006. LNCS, vol.\u00a04014, pp. 49\u201368. Springer, Heidelberg (2006)"},{"key":"22_CR2","unstructured":"M.\u00a0Bellare and P.\u00a0Rogaway. The game-playing technique, December 2004. At http:\/\/www.cs.ucdavis.edu\/~rogaway\/papers\/games.html ."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: A computationally sound mechanized prover for security protocols. In: IEEE Symposium on Security and Privacy, Oakland, California (2006)","DOI":"10.1109\/SP.2006.1"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer-Verlag, Heidelberg (2001)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"R.\u00a0Corin and J.\u00a0den Hartog. A probabilistic hoare-style logic for game-based cryptographic proofs 2006.(long version, http:\/\/eprint.iacr.org\/2005\/467 )","DOI":"10.1007\/11787006_22"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031, 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Filli\u00e2tre, J.-C.: Why: a multi-language multi-prover verification tool. Technical report, LRI, Universit\u00e9 Paris Sud (2003)","DOI":"10.1007\/978-3-540-30482-1_10"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Galindo, D.: Boneh-franklin identity based encryption revisited. In: ICALP, pp. 791\u2013802 (2005)","DOI":"10.1007\/11523468_64"},{"key":"22_CR9","unstructured":"Halevi, S.: A plausible approach to computer-aided cryptographic proofs (2005), At http:\/\/eprint.iacr.org\/2005\/181\/"},{"key":"22_CR10","unstructured":"den Hartog, J.I.: Probabilistic Extensions of Semantical Models. In: PhD thesis (2002)"},{"issue":"3","key":"22_CR11","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1142\/S012905410200114X","volume":"13","author":"J.I. Hartog den","year":"2002","unstructured":"den Hartog, J.I., de Vink, E.P.: Verifying probabilistic programs using a Hoare like logic. Int. Journal of Foundations of Computer Science\u00a013(3), 315\u2013340 (2002)","journal-title":"Int. Journal of Foundations of Computer Science"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1145\/363235.363259","volume":"12","author":"C.A.R. Hoare","year":"1969","unstructured":"Hoare, C.A.R.: An axiomatic basis for computer programming. Communications of the ACM\u00a012, 576\u2013580 (1969)","journal-title":"Communications of the ACM"},{"key":"22_CR13","unstructured":"Hooman, J.: Program design in PVS. In: Workshop on Tool Support for System Development and Verification, Germany (1997)"},{"key":"22_CR14","first-page":"387","volume-title":"Proc. of the Workshop on Hardware Verification","author":"M.J.C. Gordon","year":"1988","unstructured":"Gordon, M.J.C.: Mechanizing programming logics in higher-order logic. In: Proc. of the Workshop on Hardware Verification, pp. 387\u2013439. Springer, Heidelberg (1988)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Ramanathan, A., Mitchell, J.C., Scedrov, A., Teague, V.: Probabilistic bisimulation and equivalence for security analysis of network protocols. In: FoSSaCS, pp. 468\u2013483 (2004)","DOI":"10.1007\/978-3-540-24727-2_33"},{"key":"22_CR16","unstructured":"V.\u00a0Shoup. Sequences of games: a tool for taming complexity in security proofs, May 2005.At http:\/\/www.shoup.net\/papers\/games.pdf ."},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Tarento, S.: Machine-checked security proofs of cryptographic signature schemes. In: ESORICS, pp. 140\u2013158 (2005)","DOI":"10.1007\/11555827_9"}],"container-title":["Lecture Notes in Computer Science","Automata, Languages and Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11787006_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T17:19:50Z","timestamp":1555694390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11787006_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540359074","9783540359081"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11787006_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}