Composition of password-based protocols
From MaRDI portal
Publication:2248082
DOI10.1007/s10703-013-0184-6zbMath1291.68035OpenAlexW2045679397WikidataQ114689970 ScholiaQ114689970MaRDI QIDQ2248082
Steve Kremer, Stéphanie Delaune, Céline Chevalier, Mark D. Ryan
Publication date: 30 June 2014
Published in: Formal Methods in System Design (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/hal-00878640/file/CDKR-fmsd13.pdf
Cryptography (94A60) Specification and verification (program logics, model checking, etc.) (68Q60) Network protocols (68M12) Internet topics (68M11)
Related Items
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols, Modular verification of protocol equivalence in the presence of randomness, Stateful protocol composition
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks
- Safely composing security protocols
- A framework for compositional verification of security protocols
- Contributory Password-Authenticated Group Key Exchange with Join Capability
- Smooth Projective Hashing for Conditionally Extractable Commitments
- Strong Cryptography from Weak Secrets
- Mobile values, new names, and secure communication
- Universally Composable Password-Based Key Exchange
- Safely Composing Security Protocols
- Bounding Messages for Free in Security Protocols
- From One Session to Many: Dynamic Tags for Security Protocols
- Computer Aided Verification
- Foundations of Software Science and Computation Structures