An attack on a recursive authentication protocol. A cautionary tale
From MaRDI portal
(Redirected from Publication:293167)
Recommendations
Cited in
(12)- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- scientific article; zbMATH DE number 1844578 (Why is no real title available?)
- An NP decision procedure for protocol insecurity with XOR
- A domain-specific language for cryptographic protocols based on streams
- Simulation relations for alternating Büchi automata
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
- Analysis of the Yahalom-Paulson protocol and its improvement
- Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
- Symbolic protocol analysis for monoidal equational theories
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
- Combining proverif and automated theorem provers for security protocol verification
- Two attacks on Neuman-Stubblebine authentication protocols
This page was built for publication: An attack on a recursive authentication protocol. A cautionary tale
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q293167)