DolevYao model

Results: 7



#Item
1Cryptographic protocol / DolevYao model / Communications protocol / Decidability / Philosophy / Abstraction / Computing

On Well-founded Security Protocols (Extended Abstract) Sibylle Fr¨oschle OFFIS & University of Oldenburg, Germany Email: Consider the decidability problem that stands behind

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:52
2Cryptography / Applied mathematics / Computer security / Advantage / Provable security / Cryptographic protocol / Data Encryption Standard / DolevYao model / NeedhamSchroeder protocol

A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:52
3Ciphertext indistinguishability / Cryptography / DolevYao model / Communications protocol / Computing

Protocol Indistinguishability and the Computationally Complete Symbolic Attacker (Extended Abstract) Gergei Bana INRIA Paris, France

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:52
4Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR

Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole

Add to Reading List

Source URL: www-verimag.imag.fr

Language: English - Date: 2007-10-18 09:44:59
5Public-key cryptography / Computer security / DolevYao model / DiffieHellman key exchange / Cryptographic protocol / RSA / Exponentiation / DiffieHellman problem / Modular exponentiation

1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
6Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:15
7Cryptography / Public-key cryptography / Ciphertext indistinguishability / DolevYao model / Cryptographic protocol / Digital signature / Protocol composition logic / Cryptographic primitive / XTR / Commitment scheme / Index of cryptography articles

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:13
UPDATE