Three systems for cryptographic protocol analysis
From MaRDI portal
Publication:1330137
DOI10.1007/BF00197942zbMath0814.94011MaRDI QIDQ1330137
Richard A. Kemmerer, Catherine A. Meadows, Jonathan Millen
Publication date: 17 August 1994
Published in: Journal of Cryptology (Search for Journal in Brave)
verificationsecurityspecificationauthenticationcryptographic protocolskey distributionIna JoInatestinterrogatornarrowerstate-transition
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Parallel algorithms in computer science (68W10)
Related Items
Secrecy types for asymmetric communication., A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols, Joshua Guttman: pioneering strand spaces, Deciding knowledge in security protocols under equational theories, A collusion problem and its solution, A semantics for web services authentication, A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols, Breaking and fixing public-key Kerberos, Unifying simulatability definitions in cryptographic systems under different timing assumptions, A domain-specific language for cryptographic protocols based on streams, A new logic for electronic commerce protocols, Primitives for authentication in process algebras., Finite-state analysis of two contract signing protocols, Symmetric Authentication within a Simulatable Cryptographic Library
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The Knowledge Complexity of Interactive Proof Systems
- On the security of public key protocols
- Using encryption for authentication in large networks of computers
- A semantics for a logic of authentication (extended abstract)
- Separating the specification and implementation phases in cryptology