Back to Results
First PageMeta Content
Cryptography / Applied mathematics / Computer security / Advantage / Provable security / Cryptographic protocol / Data Encryption Standard / DolevYao model / NeedhamSchroeder protocol


A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier
Add to Reading List

Document Date: 2014-07-17 09:25:52


Open Document

File Size: 42,64 KB

Share Result on Facebook