Sciweavers

155 search results - page 3 / 31
» Transducer-based analysis of cryptographic protocols
Sort
View
CCS
2001
ACM
13 years 9 months ago
Constraint solving for bounded-process cryptographic protocol analysis
The reachability problem for cryptographic protocols with nonatomic keys can be solved via a simple constraint satisfaction procedure.
Jonathan K. Millen, Vitaly Shmatikov
FC
2010
Springer
145views Cryptology» more  FC 2010»
13 years 3 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
MMMACNS
2001
Springer
13 years 9 months ago
Open Issues in Formal Methods for Cryptographic Protocol Analysis
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
Catherine Meadows
ENTCS
2007
105views more  ENTCS 2007»
13 years 5 months ago
A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
When modelling cryto-protocols by means of process calculi which express both nondeterministic and probabilistic behavior, it is customary to view the scheduler as an intruder. It...
Srecko Brlek, Sardaouna Hamadou, John Mullins
CSFW
2000
IEEE
13 years 9 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker