FCC10 Accepted Papers

A Framework for Extending Algebraic to Computational Reasoning in Cryptographic Protocol Analysis
Ideal Key Derivation and Encryption in Simulation-based Security
Computational Soundness of Hash Functions
Modular Soundness Proofs via Deduction Games (work in progress)
Secrecy-Oriended, Computationally Sound First-Order Logical Analysis of Cryptographic Protocols
The computational and decisional Diffie-Hellman assumptions in CryptoVerif
Logical Proofs of Authentication Protocols and Type-Flaw Attacks