R Küsters,
M Tuengerthal - Cryptographers' Track at the RSA Conference, 2011 - Springer
Many real-world protocols, such as SSL/TLS, SSH, IPsec, DNSSEC, IEEE 802.11 i, and
Kerberos, derive new keys from other keys. To be able to analyze such protocols in a …