A comprehensive symbolic analysis of TLS 1.3

C Cremers, M Horvat, J Hoyland, S Scott… - Proceedings of the …, 2017 - dl.acm.org
The TLS protocol is intended to enable secure end-to-end communication over insecure
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …

[PDF][PDF] An analysis of TLS 1.3 and its use in composite protocols.

J Hoyland - 2018 - core.ac.uk
The TLS protocol is one of the most important protocols today. This thesis is a study of TLS
1.3 and its use in composite protocols. The TLS protocol is intended to enable secure end-to …

[PDF][PDF] The design and analysis of real-world cryptographic protocols.

S Scott - 2018 - pure.royalholloway.ac.uk
Designing cryptographic protocols for use in the real world is a challenging task, requiring a
fine balance between practicality and security. Ad hoc constructions are often …

[引用][C] Formal Verification of the 5G Inter-Operator Signaling Protocol

HC Rudolph - 2020 - Hochschule Wismar