메뉴 건너뛰기




Volumn 1055, Issue , 1996, Pages 147-166

Breaking and fixing the Needham-Schroeder public-key protocol using FDR

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 0342658605     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-61042-1_43     Document Type: Conference Paper
Times cited : (838)

References (14)
  • 1
    • 0025522255 scopus 로고
    • Hidden assumptions in cryptographic protocols
    • Colin Boyd. Hidden assumptions in cryptographic protocols. Proceedings of the IEE, 137, Part E(6):433-436, November 1990.
    • (1990) Proceedings of the IEE , vol.137 , Issue.6 , pp. 433-436
    • Boyd, C.1
  • 2
    • 0004215976 scopus 로고
    • A logic of authentication
    • A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39
    • Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, 1989.
    • (1989) Proceedings of the Royal Society of London A , vol.426 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 3
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Dorothy E. Denning and Giovanni Maria Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 5
    • 84958790135 scopus 로고    scopus 로고
    • Formal Systems (Europe) Ltd. Failures Divergence Refinement--User Manual and Tutorial, 1993. Version 1.3
    • Formal Systems (Europe) Ltd. Failures Divergence Refinement--User Manual and Tutorial, 1993. Version 1.3.
  • 7
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Gavin Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 8
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Roger Needham and Michael Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 9
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 11
    • 0001789630 scopus 로고
    • Model-checking CSP
    • Essays in Honour of C. A. R. Hoare. Prentice-Hall
    • A. W. Roscoe. Model-checking CSP. In A Classical Mind, Essays in Honour of C. A. R. Hoare. Prentice-Hall, 1994.
    • (1994) A Classical Mind
    • Roscoe, A.W.1
  • 13
    • 84969351014 scopus 로고
    • Security properties and CSP
    • Steve Schneider. Security properties and CSP. In preparation, 1995.
    • (1995) Preparation
    • Schneider, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.