Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
From MaRDI portal
(Redirected from Publication:1874404)
Recommendations
- Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete
- Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
- Automated Deduction – CADE-20
- An NP decision procedure for protocol insecurity with XOR
- The practice of cryptographic protocol verification
Cites work
- scientific article; zbMATH DE number 1696763 (Why is no real title available?)
- scientific article; zbMATH DE number 1962758 (Why is no real title available?)
- scientific article; zbMATH DE number 1754629 (Why is no real title available?)
- scientific article; zbMATH DE number 1759624 (Why is no real title available?)
- On the security of public key protocols
- Secure networking - CQRE [Secure] '99. International exhibition and congress. Düsseldorf, Germany, November 30--December 2, 1999. Proceedings
- The NRL Protocol Analyzer: An Overview
Cited in
(55)- Decidability of equivalence of symbolic derivations
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- DeepSec: deciding equivalence properties for security protocols -- improved theory and practice
- Multi-attacker protocol validation
- The complexity of disjunction in intuitionistic logic
- scientific article; zbMATH DE number 1956548 (Why is no real title available?)
- Deciding security for protocols with recursive tests
- Active linking attacks
- From security protocols to pushdown automata
- Automatic verification of security protocols in the symbolic model: the verifier ProVerif
- Bounded memory protocols
- Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete
- A method for symbolic analysis of security protocols
- Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later
- A (restricted) quantifier elimination for security protocols
- Computing Knowledge in Security Protocols under Convergent Equational Theories
- Computing knowledge in security protocols under convergent equational theories
- Decidability and combination results for two notions of knowledge in security protocols
- Computer Science Logic
- Safely composing security protocols
- An undecidability result for AGh
- Decidability issues for extended ping-pong protocols
- Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks
- On the symbolic reduction of processes with cryptographic functions.
- An NP decision procedure for protocol insecurity with XOR
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols
- Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
- Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
- Bounded memory Dolev-Yao adversaries in collaborative systems
- Deducibility constraints and blind signatures
- Hierarchical combination of intruder theories
- Formalization in PVS of balancing properties necessary for proving security of the Dolev-Yao cascade protocol model
- Challenges in the Automated Verification of Security Protocols
- Bounding messages for free in security protocols -- extension to various security properties
- Automating security analysis: symbolic equivalence of constraint systems
- Transducer-based analysis of cryptographic protocols
- Modular verification of protocol equivalence in the presence of randomness
- Deciding Key Cycles for Security Protocols
- Safely Composing Security Protocols
- A decidable class of security protocols for both reachability and equivalence properties
- Computational soundness of symbolic analysis for protocols using hash functions
- Explicit randomness is not necessary when modeling probabilistic encryption
- Model Checking Security Protocols
- The practice of cryptographic protocol verification
- Symbolic protocol analysis for monoidal equational theories
- Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case
- Efficient representation of the attacker's knowledge in cryptographic protocols analysis
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
- Automated Deduction – CADE-20
- Verifying Cryptographic Protocols with Subterms Constraints
- Intruder deducibility constraints with negation. Decidability and application to secured service compositions
- Satisfiability of general intruder constraints with and without a set constructor
- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables
- Deciding knowledge in security protocols under some e-voting theories
- Deciding Knowledge in Security Protocols for Monoidal Equational Theories
This page was built for publication: Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1874404)