-
1
-
-
84947902524
-
-
1070. Springer-Verlag, 1996.
-
D. Coppersmith, M. Frankin, J. Patarin, and M.K. Reiter, "Low-Exponent RSA with Related Messages," U. Maurer, ed., Proc. Eurocrypt '96, Lecture Notes in Computer Science 1070. Springer-Verlag, 1996.
-
M. Frankin, J. Patarin, and M.K. Reiter, Low-Exponent RSA with Related Messages, U. Maurer, Ed., Proc. Eurocrypt '96, Lecture Notes in Computer Science
-
-
Coppersmith, D.1
-
2
-
-
35848936781
-
-
10, no. 4, 1985.
-
S.T. Eckmann and R.A. Kemmerer, "Inatest: An Interactive Environment for Testing Formal Specifications, ACM - Software Eng. Notes, vol. 10, no. 4, 1985.
-
And R.A. Kemmerer, Inatest: An Interactive Environment for Testing Formal Specifications, ACM - Software Eng. Notes, Vol.
-
-
Eckmann, S.T.1
-
3
-
-
35848971059
-
-
2 User Manual, 1997. Available via URL http://www.formal.demon.co.uk/FDR2.html.
-
"Formal Systems (Europe) Ltd." Failures-Divergence Refinement - FDR 2 User Manual, 1997. Available via URL http://www.formal.demon.co.uk/FDR2.html.
-
Ltd. Failures-Divergence Refinement - FDR
-
-
Europe, S.1
-
5
-
-
0028385109
-
-
7, no. 2, 1994.
-
R.A. Kemmerer, C. Meadows, and J. Millen, "Three Systems for Cryptographic Protocol Analysis," J. Cryptology, vol. 7, no. 2, 1994.
-
C. Meadows, and J. Millen, Three Systems for Cryptographic Protocol Analysis, J. Cryptology, Vol.
-
-
Kemmerer, R.A.1
-
6
-
-
0342658605
-
-
1055, pp. 147-166. Springer-Verlag, 1996. Also in Software - Concepts and Tools, vol. 17, pp. 93-102, 1996.
-
G. Lowe, "Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR, Proc. TACAS, Lecture Notes in Computer Science 1055, pp. 147-166. Springer-Verlag, 1996. Also in Software - Concepts and Tools, vol. 17, pp. 93-102, 1996.
-
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR, Proc. TACAS, Lecture Notes in Computer Science
-
-
Lowe, G.1
-
7
-
-
0030678388
-
-
10th IEEE Computer Security Foundations Workshop, pp. 18-30, 1997. URL http: //www.mcs.le.ac.uk/~glowe/Security/Casper/index.html.
-
G. Lowe, "Casper: A Compiler for the Analysis of Security Protocols," Proc. 10th IEEE Computer Security Foundations Workshop, pp. 18-30, 1997. URL http: //www.mcs.le.ac.uk/~glowe/Security/Casper/index.html.
-
Casper: A Compiler for the Analysis of Security Protocols, Proc.
-
-
Lowe, G.1
-
9
-
-
0023295108
-
-
13, no. 2, 1987.
-
J.K. Millen, S.C. Clark, and S.B. Freedman, "The Interrogator: Protocol Security Analysis," IEEE Trans. Software Eng., vol. 13, no. 2, 1987.
-
S.C. Clark, and S.B. Freedman, the Interrogator: Protocol Security Analysis, IEEE Trans. Software Eng., Vol.
-
-
Millen, J.K.1
-
10
-
-
0030084918
-
-
26, no. 2, pp. 113-131, 1996.
-
C. Meadows, "The NRL Protocol Analyzer: An Overview. J. Logic Programming, vol. 26, no. 2, pp. 113-131, 1996.
-
The NRL Protocol Analyzer: An Overview. J. Logic Programming, Vol.
-
-
Meadows, C.1
-
16
-
-
0017930809
-
-
21, no. 2, pp. 120-126, Feb. 1978.
-
R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Comm. ACM, Vol.
-
-
Rivest, R.L.1
-
17
-
-
0028532997
-
-
37, no. 11, pp. 56-65, 1994.
-
G.J. Simmons, "Cryptanalysis and Protocol Failures," Comm. ACM, vol. 37, no. 11, pp. 56-65, 1994.
-
Cryptanalysis and Protocol Failures, Comm. ACM, Vol.
-
-
Simmons, G.J.1
-
18
-
-
84969340391
-
-
435, pp. 324-333. Springer-Verlag, 1990.
-
M. Tatebayashi, N. Matsuzaki, and D.B. Newman Jr., "Key Distribution Protocol for Digital Mobile Communication Systems," Advances in Cryptology: Proc. Crypto '89, Lecture Notes in Computer Science 435, pp. 324-333. Springer-Verlag, 1990.
-
N. Matsuzaki, and D.B. Newman Jr., Key Distribution Protocol for Digital Mobile Communication Systems, Advances in Cryptology: Proc. Crypto '89, Lecture Notes in Computer Science
-
-
Tatebayashi, M.1
|