On the Security of Ping-Pong Protocols
From MaRDI portal
Publication:3661462
DOI10.1007/978-1-4757-0602-4_16zbMATH Open0514.94012OpenAlexW2407225512MaRDI QIDQ3661462FDOQ3661462
Authors: Danny Dolev, Shimon Even, Richard Karp
Publication date: 1983
Published in: Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-1-4757-0602-4_16
Recommendations
Cited In (11)
- A sufflcient condition for secure ping-pong protocols
- On the security of ping-pong protocols
- Revisiting the security of secure direct communication based on ping-pong protocol
- Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete
- A method for symbolic analysis of security protocols
- Title not available (Why is that?)
- Decidability issues for extended ping-pong protocols
- Title not available (Why is that?)
- A general scheme for information interception in the ping-pong protocol
- Title not available (Why is that?)
- AN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG
This page was built for publication: On the Security of Ping-Pong Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3661462)