Verification methods for the computationally complete symbolic attacker based on indistinguishability
From MaRDI portal
Publication:4972166
Recommendations
- scientific article; zbMATH DE number 6678480
- Towards unconditional soundness: computationally complete symbolic attacker
- Computational soundness of indistinguishability properties without computable parsing
- On Communication Models When Verifying Equivalence Properties
- Automatic verification of security protocols in the symbolic model: the verifier ProVerif
Cited in
(2)
This page was built for publication: Verification methods for the computationally complete symbolic attacker based on indistinguishability
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4972166)