Formal Verification of Cryptographic Protocols: A Survey

作者: Catherine A. Meadows , Catherine A. Meadows

DOI: 10.1007/BFB0000430

关键词:

摘要: … We note that this attack results in at worst a denial of service, since, although the intruder convinces A that a nonkey is a key, the intruder never learns the word that A accepts as a key, …

参考文章(48)
Shimon Even, Oded Goldreich, Adi Shamir, On the Security of Ping-Pong Protocols when Implemented using the RSA (Extended Abstract) theory and application of cryptographic techniques. pp. 58- 72 ,(1985) , 10.1007/3-540-39799-X_7
Oded Goldreich, Shimon Even, Adi Shamir, On the Security of Ping-Pong Protocols when Implemented using the RSA international cryptology conference. pp. 58- 72 ,(1985)
D. Longley, S. Rigby, Refereed articles: An automatic search for security flaws in key management schemes Computers & Security. ,vol. 11, pp. 75- 89 ,(1992) , 10.1016/0167-4048(92)90222-D
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
Rajashekar Kailar, Virgil D. Gligor, Li Gong, On the Security Effectiveness of Cryptographic Protocols Springer, Vienna. pp. 139- 157 ,(1995) , 10.1007/978-3-7091-9396-9_12
Marie-Jeanne Toussaint, Deriving the Complete Knowledge of Participants in Cryptographic Protocols international cryptology conference. pp. 24- 43 ,(1991) , 10.1007/3-540-46766-1_2
Catherine Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol Journal of Computer Security. ,vol. 1, pp. 5- 35 ,(1992) , 10.3233/JCS-1992-1102
Paul Syverson, Catherine Meadows, Formal requirements for key distribution protocols theory and application of cryptographic techniques. pp. 320- 331 ,(1994) , 10.1007/BFB0053447
Paul F. Syverson, Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols Journal of Computer Security. ,vol. 1, pp. 317- 334 ,(1992) , 10.3233/JCS-1992-13-407
Raphael Yahalom, Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols Journal of Computer Security. ,vol. 2, pp. 191- 209 ,(1993) , 10.3233/JCS-1993-22-307