Separating the specification and implementation phases in cryptology
- 1 January 1992
- book chapter
- Published by Springer Nature
- p. 77-101
- https://doi.org/10.1007/bfb0013893
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Deriving the Complete Knowledge of Participants in Cryptographic ProtocolsPublished by Springer Nature ,2001
- How To Prove Yourself: Practical Solutions to Identification and Signature ProblemsPublished by Springer Nature ,2000
- Security defects in CCITT recommendation X.509ACM SIGCOMM Computer Communication Review, 1990
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- Secure Audio TeleconferencePublished by Springer Nature ,1988
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984