Key Substitution in the Symbolic Analysis of Cryptographic Protocols
From MaRDI portal
Publication:5458828
DOI10.1007/978-3-540-77050-3_10zbMath1135.94326MaRDI QIDQ5458828
Yannick Chevalier, Mounira Kourjieh
Publication date: 24 April 2008
Published in: FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77050-3_10
Related Items
Key Substitution in the Symbolic Analysis of Cryptographic Protocols, Computing knowledge in security protocols under convergent equational theories
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Security of signature schemes in a multi-user setting
- On the symbolic reduction of processes with cryptographic functions.
- The NRL Protocol Analyzer: An Overview
- Towards an Automatic Analysis of Web Service Security
- Digital Signatures Do Not Guarantee Exclusive Ownership
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Intruders with Caps
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols
- Automata, Languages and Programming