A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
- 1 January 2003
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 25 references indexed in Scilit:
- Cryptographically Sound and Machine-Assisted Verification of Security ProtocolsPublished by Springer Nature ,2003
- Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*Journal of Cryptology, 2002
- Formal Eavesdropping and Its Computational InterpretationPublished by Springer Nature ,2001
- Entity Authentication and Key DistributionPublished by Springer Nature ,2001
- Universally composable security: a new paradigm for cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- A Calculus for Cryptographic Protocols: The Spi CalculusInformation and Computation, 1999
- Relations among notions of security for public-key encryption schemesPublished by Springer Nature ,1998
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983