An attack on a recursive authentication protocol. A cautionary tale
From MaRDI portal
Publication:293167
DOI10.1016/S0020-0190(97)00180-4zbMath1339.94062OpenAlexW2078671172MaRDI QIDQ293167
S. A. Schneider, Peter Y. A. Ryan
Publication date: 9 June 2016
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: http://www.sciencedirect.com/science/article/pii/S0020019097001804?np=y
Related Items (9)
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols ⋮ Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties ⋮ Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols ⋮ Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol ⋮ Symbolic protocol analysis for monoidal equational theories ⋮ An NP decision procedure for protocol insecurity with XOR ⋮ Simulation relations for alternating Büchi automata ⋮ A domain-specific language for cryptographic protocols based on streams ⋮ Combining proverif and automated theorem provers for security protocol verification
Cites Work
This page was built for publication: An attack on a recursive authentication protocol. A cautionary tale