The NRL protocol analyzer: An overview

C Meadows - The Journal of Logic Programming, 1996 - Elsevier
The NRL Protocol Analyzer is a prototype special-purpose verification tool, written in Prolog,
that has been developed for the analysis of cryptographic protocols that are used to …

Authenticated Diffe-Hellman key agreement protocols

S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …

[图书][B] Applied cryptography: protocols, algorithms, and source code in C

B Schneier - 2007 - books.google.com
About The Book: This new edition of the cryptography classic provides you with a
comprehensive survey of modern cryptography. The book details how programmers and …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Universally composable security: A new paradigm for cryptographic protocols

R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …

[图书][B] Modern cryptography: theory and practice

W Mao - 2003 - books.google.com
Our society has entered an era where commerce activities, business transactions and
government services have been, and more and more of them will be, conducted and offered …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Mobile values, new names, and secure communication

M Abadi, C Fournet - ACM Sigplan Notices, 2001 - dl.acm.org
We study the interaction of the" new" construct with a rich but common form of (first-order)
communication. This interaction is crucial in security protocols, which are the main …

The inductive approach to verifying cryptographic protocols

LC Paulson - Journal of computer security, 1998 - content.iospress.com
Informal arguments that cryptographic protocols are secure can be made rigorous using
inductive definitions. The approach is based on ordinary predicate calculus and copes with …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …