메뉴 건너뛰기




Volumn 2986, Issue , 2004, Pages 355-369

Decidable analysis of cryptographic protocols with products and modular exponentiation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; GROUP THEORY;

EID: 35048827395     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24725-8_25     Document Type: Article
Times cited : (24)

References (19)
  • 2
    • 0346205107 scopus 로고    scopus 로고
    • Unification theory
    • A. Robinson and A. Voronkov, editors, chapter 8, Elsevier Science
    • F. Baader and W. Snyder. Unification theory. In A. Robinson and A. Voronkov, editors, Handbook of Automated Reasoning, volume 1, chapter 8, pages 445-532. Elsevier Science, 2001.
    • (2001) Handbook of Automated Reasoning, Volume 1 , vol.1 , pp. 445-532
    • Baader, F.1    Snyder, W.2
  • 4
    • 33645585862 scopus 로고    scopus 로고
    • On the symbolic analysis of low-level cryptographic primitives: Modular exponentiation and the Diffie-Hellman protocol
    • M. Boreale and M. Buscemi. On the symbolic analysis of low-level cryptographic primitives: modular exponentiation and the Diffie-Hellman protocol. In Proc. Workshop on the Foundations of Computer Security (PCS), 2003.
    • (2003) Proc. Workshop on the Foundations of Computer Security (PCS)
    • Boreale, M.1    Buscemi, M.2
  • 5
    • 33645587296 scopus 로고    scopus 로고
    • Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    • CAU Kiel
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. Technical Report IFI-Report 0305, CAU Kiel, 2003.
    • (2003) Technical Report IFI-Report , vol.305
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 7
    • 0001113391 scopus 로고
    • An efficient algorithm for solving systems of Diophantine equations
    • E. Contejean and H. Devie. An efficient algorithm for solving systems of Diophantine equations. Information and Computation, 113(1):143-172, 1994.
    • (1994) Information and Computation , vol.113 , Issue.1 , pp. 143-172
    • Contejean, E.1    Devie, H.2
  • 18
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol: A cautionary tale
    • P. Ryan and S. Schneider. An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters, 65(1):7-10, 1998.
    • (1998) Information Processing Letters , vol.65 , Issue.1 , pp. 7-10
    • Ryan, P.1    Schneider, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.