Key Substitution in the Symbolic Analysis of Cryptographic Protocols
From MaRDI portal
Publication:5458828
Recommendations
Cites work
- scientific article; zbMATH DE number 1186874 (Why is no real title available?)
- scientific article; zbMATH DE number 3688776 (Why is no real title available?)
- scientific article; zbMATH DE number 1341618 (Why is no real title available?)
- scientific article; zbMATH DE number 1341873 (Why is no real title available?)
- scientific article; zbMATH DE number 1973985 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Automata, Languages and Programming
- Digital Signatures Do Not Guarantee Exclusive Ownership
- Intruders with Caps
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols
- On the symbolic reduction of processes with cryptographic functions.
- Security of signature schemes in a multi-user setting
- The NRL Protocol Analyzer: An Overview
- Towards an Automatic Analysis of Web Service Security
Cited in
(2)
This page was built for publication: Key Substitution in the Symbolic Analysis of Cryptographic Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458828)