Sciweavers

49 search results - page 1 / 10
» Model-Based Testing of Cryptographic Protocols
Sort
View
TGC
2005
Springer
13 years 10 months ago
Model-Based Testing of Cryptographic Protocols
Dean Rosenzweig, Davor Runje, Wolfram Schulte
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
13 years 10 months ago
Breaking a Cryptographic Protocol with Pseudoprimes
The Miller-Rabin pseudo primality test is widely used in cryptographic libraries, because of its apparent simplicity. But the test is not always correctly implemented. For example ...
Daniel Bleichenbacher
FOSSACS
2009
Springer
14 years 1 days ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman