Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
- 1 January 2005
- book chapter
- Published by Springer Nature
- p. 178-196
- https://doi.org/10.1007/11555827_11
Abstract
No abstract availableKeywords
This publication has 39 references indexed in Scilit:
- OFMC: A symbolic model checker for security protocolsInternational Journal of Information Security, 2005
- A Cryptographically Sound Security Proof of the Needham–Schroeder–Lowe Public-Key ProtocolIEEE Journal on Selected Areas in Communications, 2004
- Soundness of Formal Encryption in the Presence of Active AdversariesPublished by Springer Nature ,2004
- Decidable Analysis of Cryptographic Protocols with Products and Modular ExponentiationPublished by Springer Nature ,2004
- Just Fast Keying in the Pi CalculusPublished by Springer Nature ,2004
- Key establishment in large dynamic groups using one-way function treesIEEE Transactions on Software Engineering, 2003
- Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in ExponentsPublished by Springer Nature ,2003
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983