Deriving the Complete Knowledge of Participants in Cryptographic Protocols
- 18 May 2001
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Using narrowing in the analysis of key management protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- The use of logic in the analysis of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Representing partial knowledge in an algebraic security modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On the Security of Ping-Pong Protocols when Implemented using the RSA (Extended Abstract)Published by Springer Nature ,2000
- Reasoning about belief in cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Analyzing encryption protocols using formal verification techniquesIEEE Journal on Selected Areas in Communications, 1989
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- Protocol failures in cryptosystemsProceedings of the IEEE, 1988
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984