<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Ciphertext indistinguishability / DolevYao model / Cryptographic protocol / Digital signature / Protocol composition logic / Cryptographic primitive / XTR / Commitment scheme / Index of cryptography articles
Date: 2010-07-17 01:14:13
Cryptography
Public-key cryptography
Ciphertext indistinguishability
DolevYao model
Cryptographic protocol
Digital signature
Protocol composition logic
Cryptographic primitive
XTR
Commitment scheme
Index of cryptography articles

Add to Reading List

Source URL: seclab.stanford.edu

Download Document from Source Website

File Size: 198,81 KB

Share Document on Facebook

Similar Documents

Cryptographic protocol / DolevYao model / Communications protocol / Decidability / Philosophy / Abstraction / Computing

On Well-founded Security Protocols (Extended Abstract) Sibylle Fr¨oschle OFFIS & University of Oldenburg, Germany Email: Consider the decidability problem that stands behind

DocID: 1nFvv - View Document

Cryptography / Applied mathematics / Computer security / Advantage / Provable security / Cryptographic protocol / Data Encryption Standard / DolevYao model / NeedhamSchroeder protocol

A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

DocID: 1mEFH - View Document

Ciphertext indistinguishability / Cryptography / DolevYao model / Communications protocol / Computing

Protocol Indistinguishability and the Computationally Complete Symbolic Attacker (Extended Abstract) Gergei Bana INRIA Paris, France

DocID: 1mDtC - View Document

Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR

Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole

DocID: 1mhYJ - View Document

Public-key cryptography / Computer security / DolevYao model / DiffieHellman key exchange / Cryptographic protocol / RSA / Exponentiation / DiffieHellman problem / Modular exponentiation

1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

DocID: 1lnSV - View Document