Algebra model and security analysis for cryptographic protocols
From MaRDI portal
Recommendations
- Algebraic Intruder Deductions
- Cryptographic protocol security analysis based on bounded constructing algorithm
- Symbolic protocol analysis for monoidal equational theories
- scientific article; zbMATH DE number 3965967
- Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
Cited in
(11)- scientific article; zbMATH DE number 2042808 (Why is no real title available?)
- scientific article; zbMATH DE number 7211469 (Why is no real title available?)
- scientific article; zbMATH DE number 7120872 (Why is no real title available?)
- scientific article; zbMATH DE number 7300422 (Why is no real title available?)
- On the relative soundness of the free algebra model for public key encryption
- Protocol security analysis based on an ideal
- scientific article; zbMATH DE number 1189381 (Why is no real title available?)
- Introducing commutative and associative operators in cryptographic protocol analysis
- Algebraic adversaries in the universal composability framework
- Algebraic state machines: concepts and applications to security
- Cryptographic protocol security analysis based on bounded constructing algorithm
This page was built for publication: Algebra model and security analysis for cryptographic protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q866077)