Key Substitution in the Symbolic Analysis of Cryptographic Protocols
From MaRDI portal
Publication:5458828
DOI10.1007/978-3-540-77050-3_10zbMATH Open1135.94326OpenAlexW1814386517MaRDI QIDQ5458828FDOQ5458828
Authors: Yannick Chevalier, Mounira Kourjieh
Publication date: 24 April 2008
Published in: FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77050-3_10
Recommendations
Cites Work
- The NRL Protocol Analyzer: An Overview
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- On the symbolic reduction of processes with cryptographic functions.
- Security of signature schemes in a multi-user setting
- Title not available (Why is that?)
- Intruders with Caps
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols
- Automata, Languages and Programming
- Title not available (Why is that?)
- Towards an Automatic Analysis of Web Service Security
- Title not available (Why is that?)
- Digital Signatures Do Not Guarantee Exclusive Ownership
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (2)
This page was built for publication: Key Substitution in the Symbolic Analysis of Cryptographic Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458828)