Automatic Analysis of the Security of XOR-Based Key Management Schemes
From MaRDI portal
Publication:5758129
DOI10.1007/978-3-540-71209-1_42zbMATH Open1186.68180OpenAlexW2139017685MaRDI QIDQ5758129FDOQ5758129
Authors: Véronique Cortier, Gavin Keighren, Graham Steel
Publication date: 3 September 2007
Published in: Tools and Algorithms for the Construction and Analysis of Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71209-1_42
Recommendations
- On the Automatic Analysis of Recursive Security Protocols with XOR
- An NP decision procedure for protocol insecurity with XOR
- Automated Deduction – CADE-20
- Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach
- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data
Cited In (11)
- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data
- Tree automata for detecting attacks on protocols with algebraic cryptographic primitives
- Automated Deduction – CADE-20
- An NP decision procedure for protocol insecurity with XOR
- Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013
- Improved Security Analysis of XEX and LRW Modes
- A generic security API for symmetric key management on cryptographic devices
- Secure key management policies in strand spaces
- A modular treatment of cryptographic APIs: the symmetric-key case
- Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case
- Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach
This page was built for publication: Automatic Analysis of the Security of XOR-Based Key Management Schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5758129)