Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Symbolic protocol analysis with products and Diffie-Hellman exponentiationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Intruder deductions, constraint solving and insecurity decision in presence of exclusive orPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- An E-unification Algorithm for Analyzing Protocols That Use Modular ExponentiationPublished by Springer Nature ,2003
- Mechanized proofs for a recursive authentication protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Constraint solving for bounded-process cryptographic protocol analysisPublished by Association for Computing Machinery (ACM) ,2001
- Symbolic Trace Analysis of Cryptographic ProtocolsPublished by Springer Nature ,2001
- Computing symbolic models for verifying cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- Unification TheoryPublished by Elsevier ,2001
- On the Reachability Problem in Cryptographic ProtocolsPublished by Springer Nature ,2000
- An Efficient Incremental Algorithm for Solving Systems of Linear Diophantine EquationsInformation and Computation, 1994