An attack on the Needham-Schroeder public-key authentication protocol

From MaRDI portal
Publication:672251

DOI10.1016/0020-0190(95)00144-2zbMath0875.94114OpenAlexW2169908972WikidataQ55980164 ScholiaQ55980164MaRDI QIDQ672251

Gavin Lowe

Publication date: 28 February 1997

Published in: Information Processing Letters (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/0020-0190(95)00144-2



Related Items

Security in the Ajanta mobile agent system, An approach for formal verification of authentication protocols, Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods, A tutorial-style introduction to \(\mathsf{DY}^{\star}\), Joshua Guttman: pioneering strand spaces, Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols, Types for Secure Pattern Matching with Local Knowledge in Universal Concurrent Constraint Programming, Intruder deduction for the equational theory of abelian groups with distributive encryption, Counterexample classification, Unnamed Item, Universally composable symbolic security analysis, SAT-solving in CSP trace refinement, The meeting businessmen problem: requirements and limitations, Challenges in the Automated Verification of Security Protocols, Automated type-based analysis of injective agreement in the presence of compromised principals, Transducer-based analysis of cryptographic protocols, Theorem Proving Based on Proof Scores for Rewrite Theory Specifications of OTSs, Certificateless one-pass and two-party authenticated key agreement protocol and its extensions, A bisimulation for dynamic sealing, Cryptographic logical relations, Unnamed Item, Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically, Verifying security protocols with PVS: widening the rank function approach, An NP decision procedure for protocol insecurity with XOR, Simulation relations for alternating Büchi automata, On Establishing and Fixing a Parallel Session Attack in a Security Protocol, Formal modeling, performance estimation, and model checking of wireless sensor network algorithms in Real-Time Maude, Completeness and Herbrand theorems for nominal logic, Graphical Calculus for Quantum Key Distribution (Extended Abstract), Abstract Interpretation for Proving Secrecy Properties in Security Protocols, Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model, An attack-finding algorithm for security protocols., A new logic for electronic commerce protocols, Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions, Authentication tests and the structure of bundles.



Cites Work