On the formal analysis of PKCS authentication protocols
- 18 June 2005
- book chapter
- Published by Springer Nature
- p. 105-121
- https://doi.org/10.1007/bfb0030355
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- Using narrowing in the analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- Zero-knowledge proofs of identityJournal of Cryptology, 1988
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- An axiomatic basis for computer programmingCommunications of the ACM, 1969