On the Automatic Analysis of Recursive Security Protocols with XOR
From MaRDI portal
Publication:3590969
DOI10.1007/978-3-540-70918-3_55zbMath1186.68181OpenAlexW1584001157MaRDI QIDQ3590969
Ralf Küsters, Tomasz Truderung
Publication date: 3 September 2007
Published in: STACS 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70918-3_55
Related Items (7)
Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystems ⋮ Unnamed Item ⋮ Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol ⋮ Proving Group Protocols Secure Against Eavesdroppers ⋮ Transducer-based analysis of cryptographic protocols ⋮ Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach ⋮ Deciding Security for Protocols with Recursive Tests
This page was built for publication: On the Automatic Analysis of Recursive Security Protocols with XOR