On the Automatic Analysis of Recursive Security Protocols with XOR
From MaRDI portal
Publication:3590969
Recommendations
Cited in
(13)- Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystems
- Automated Deduction – CADE-20
- Deciding security for protocols with recursive tests
- An NP decision procedure for protocol insecurity with XOR
- Improved Security Analysis of XEX and LRW Modes
- Automatic Analysis of the Security of XOR-Based Key Management Schemes
- Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
- Transducer-based analysis of cryptographic protocols
- Analysis of the Xedni calculus attack
- Proving Group Protocols Secure Against Eavesdroppers
- CryptoSolve: towards a tool for the symbolic analysis of cryptographic algorithms
- STACS 2004
- Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach
This page was built for publication: On the Automatic Analysis of Recursive Security Protocols with XOR
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3590969)