An attack on a recursive authentication protocol. A cautionary tale
From MaRDI portal
Recommendations
Cited in
(12)- A domain-specific language for cryptographic protocols based on streams
- Combining proverif and automated theorem provers for security protocol verification
- Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
- An NP decision procedure for protocol insecurity with XOR
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
- Analysis of the Yahalom-Paulson protocol and its improvement
- Two attacks on Neuman-Stubblebine authentication protocols
- Simulation relations for alternating Büchi automata
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
- Symbolic protocol analysis for monoidal equational theories
- scientific article; zbMATH DE number 1844578 (Why is no real title available?)
This page was built for publication: An attack on a recursive authentication protocol. A cautionary tale
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q293167)