Automatic Analysis of the Security of XOR-Based Key Management Schemes
From MaRDI portal
Publication:5758129
DOI10.1007/978-3-540-71209-1_42zbMath1186.68180MaRDI QIDQ5758129
Véronique Cortier, Graham Steel, Gavin Keighren
Publication date: 3 September 2007
Published in: Tools and Algorithms for the Construction and Analysis of Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71209-1_42
Related Items
Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives, A generic security API for symmetric key management on cryptographic devices, Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach, Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case