Three systems for cryptographic protocol analysis
From MaRDI portal
Publication:1330137
DOI10.1007/BF00197942zbMath0814.94011MaRDI QIDQ1330137
Richard A. Kemmerer, Catherine A. Meadows, Jonathan Millen
Publication date: 17 August 1994
Published in: Journal of Cryptology (Search for Journal in Brave)
verificationsecurityspecificationauthenticationcryptographic protocolskey distributionIna JoInatestinterrogatornarrowerstate-transition
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Parallel algorithms in computer science (68W10)
Related Items (14)
Secrecy types for asymmetric communication. ⋮ A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols ⋮ Joshua Guttman: pioneering strand spaces ⋮ Deciding knowledge in security protocols under equational theories ⋮ A collusion problem and its solution ⋮ A semantics for web services authentication ⋮ A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols ⋮ Breaking and fixing public-key Kerberos ⋮ Unifying simulatability definitions in cryptographic systems under different timing assumptions ⋮ A domain-specific language for cryptographic protocols based on streams ⋮ A new logic for electronic commerce protocols ⋮ Primitives for authentication in process algebras. ⋮ Finite-state analysis of two contract signing protocols ⋮ Symmetric Authentication within a Simulatable Cryptographic Library
Cites Work
- The Knowledge Complexity of Interactive Proof Systems
- On the security of public key protocols
- Using encryption for authentication in large networks of computers
- A semantics for a logic of authentication (extended abstract)
- Separating the specification and implementation phases in cryptology
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Three systems for cryptographic protocol analysis