@inproceedings(Abadi2001, author = {Mart\'{\i}n Abadi and C{\'e}dric Fournet}, year = {2001}, title = {Mobile Values, New Names, and Secure Communication}, booktitle = {Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages}, series = {POPL'01}, publisher = {ACM}, address = {New York, NY, USA}, pages = {104--115}, url = {http://doi.acm.org/10.1145/360204.360213}, ) @book(Baader98, author = {Franz Baader and Tobias Nipkow}, year = {1998}, title = {{Term rewriting and all that}}, publisher = {Cambridge University Press}, address = {New York, NY, USA}, url = {https://doi.org/10.1017/CBO9781139172752}, ) @inproceedings(DBLP:conf/ccs/BartheCGKLSB13, author = {Gilles Barthe and Juan Manuel Crespo and Benjamin Gr{\'{e}}goire and C{\'{e}}sar Kunz and Yassine Lakhnech and Benedikt Schmidt and Santiago Zanella B{\'{e}}guelin}, year = {2013}, title = {Fully automated analysis of padding-based encryption in the computational model}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, publisher = {{ACM}}, pages = {1247--1260}, url = {https://doi.org/10.1145/2508859.2516663}, ) @incollection(baudet2005computationally, author = {Mathieu Baudet and V{\'e}ronique Cortier and Steve Kremer}, year = {2005}, title = {Computationally sound implementations of equational theories against passive adversaries}, booktitle = {Automata, Languages and Programming}, publisher = {Springer}, pages = {652--663}, url = {https://doi.org/10.1007/11523468_53}, ) @inproceedings(DBLP:conf/crypto/CarmerR16, author = {Brent Carmer and Mike Rosulek}, year = {2016}, title = {Linicrypt: {A} Model for Practical Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, pages = {416--445}, url = {http://dx.doi.org/10.1007/978-3-662-53015-3_15}, ) @inproceedings(xcbc, author = {Virgil D. Gligor and Pompiliu Donescu}, year = {2002}, title = {Fast encryption and authentication: {XCBC} encryption and XECB authentication modes}, booktitle = {Fast Software Encryption (FSE) 2001}, pages = {92--108}, doi = {10.1007/3-540-45473-X_8}, ) @inproceedings(10.1145/2810103.2813636, author = {Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff}, year = {2015}, title = {Automated Analysis and Synthesis of Authenticated Encryption Schemes}, booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, pages = {84--95}, url = {https://doi.org/10.1145/2810103.2813636}, ) @inproceedings(Hollenberg22, author = {Tommy Hollenberg and Mike Rosulek and Lawrence Roy}, year = {2022}, title = {A Complete Characterization of Security for Linicrypt Block Cipher Modes}, booktitle = {2022 IEEE 35th Computer Security Foundations Symposium (CSF)}, pages = {423--438}, doi = {10.1109/CSF54842.2022.00028}, ) @inproceedings(DBLP:conf/stacs/KustersT07, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, year = {2007}, title = {On the Automatic Analysis of Recursive Security Protocols with {XOR}}, booktitle = {{STACS} 2007, 24th Annual Symposium on Theoretical Aspects of Computer Science, Aachen, Germany, February 22-24, 2007, Proceedings}, pages = {646--657}, url = {https://doi.org/10.1007/978-3-540-70918-3\_55}, ) @article(LinLynch20, author = {Hai Lin and Christopher Lynch}, year = {2020}, title = {Local XOR Unification: Definitions, Algorithms and Application to Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2020}, pages = {929}, url = {https://eprint.iacr.org/2020/929}, ) @inproceedings(frocos2021LL, author = {Hai Lin and Christopher Lynch}, year = {2021}, title = {Formal Analysis of Symbolic Authenticity}, editor = {Boris Konev and Giles Reger}, booktitle = {Frontiers of Combining Systems - 13th International Symposium, FroCoS 2021, Birmingham, UK, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12941}, publisher = {Springer}, pages = {271--286}, url = {https://doi.org/10.1007/978-3-030-86205-3\_15}, ) @inproceedings(frocos2021, author = {Hai Lin and Christopher Lynch and Andrew M. Marshall and Catherine A. Meadows and Paliath Narendran and Veena Ravishankar and Brandon Rozek}, year = {2021}, title = {Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems}, editor = {Boris Konev and Giles Reger}, booktitle = {Frontiers of Combining Systems - 13th International Symposium, FroCoS 2021, Birmingham, UK, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12941}, publisher = {Springer}, pages = {253--270}, url = {https://doi.org/10.1007/978-3-030-86205-3\_14}, ) @inproceedings(tweakableBC, author = {Moses Liskov and Ronald L. Rivest and David Wagner}, year = {2002}, title = {Tweakable block ciphers}, booktitle = {Advances in Cryptology-Crypto 2002}, pages = {31--46}, doi = {10.1007/3-540-45708-9_3}, ) @inproceedings(DBLP:conf/csfw/MalozemoffKG14, author = {Alex J. Malozemoff and Jonathan Katz and Matthew D. Green}, year = {2014}, title = {Automated Analysis and Synthesis of Block-Cipher Modes of Operation}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, publisher = {{IEEE} Computer Society}, pages = {140--152}, url = {https://doi.org/10.1109/CSF.2014.18}, ) @inproceedings(DBLP:conf/tcc/McQuoidSR19, author = {Ian McQuoid and Trevor Swope and Mike Rosulek}, year = {2019}, title = {Characterizing Collision and Second-Preimage Resistance in Linicrypt}, editor = {Dennis Hofheinz and Alon Rosen}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, publisher = {Springer}, pages = {451--470}, url = {https://doi.org/10.1007/978-3-030-36030-6\_18}, ) @inproceedings(MeadowsESORICS21, author = {Catherine Meadows}, year = {2021}, title = {Moving the Bar on Computationally Sound Exclusive-Or}, editor = {Elisa Bertino and Haya Shulman and Michael Waidner}, booktitle = {Computer Security -- ESORICS 2021}, publisher = {Springer International Publishing}, address = {Cham}, pages = {275--295}, url = {https://doi.org/10.1007/978-3-030-88428-4_14}, ) @article(DBLP:journals/iacr/Meadows20, author = {Catherine A. Meadows}, year = {2020}, title = {Symbolic and Computational Reasoning About Cryptographic Modes of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2020}, pages = {794}, url = {https://eprint.iacr.org/2020/794}, ) @inproceedings(DBLP:conf/fse/Rogaway04, author = {Phillip Rogaway}, year = {2004}, title = {Nonce-Based Symmetric Encryption}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, pages = {348--359}, url = {https://doi.org/10.1007/978-3-540-25937-4\_22}, ) @inproceedings(ocb, author = {Phillip Rogaway and Mihir Bellare and John Black and Ted Krovetz}, year = {2001}, title = {{OCB}: A block-cipher mode of operation for efficient authenticated encryption}, booktitle = {8th ACM Conference on Computer and Communications Security (CCS)}, pages = {196--205}, doi = {10.1145/937527.937529}, ) @article(DBLP:journals/iacr/Unruh10b, author = {Dominique Unruh}, year = {2010}, title = {The impossibility of computationally sound {XOR}}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2010}, pages = {389}, url = {http://eprint.iacr.org/2010/389}, ) @inproceedings(DBLP:conf/ctrsa/VenemaA21, author = {Marloes Venema and Greg Alp{\'{a}}r}, year = {2021}, title = {A Bunch of Broken Schemes: {A} Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption}, editor = {Kenneth G. Paterson}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, publisher = {Springer}, pages = {100--125}, url = {https://doi.org/10.1007/978-3-030-75539-3\_5}, )