메뉴 건너뛰기




Volumn 7126 LNCS, Issue , 2012, Pages 70-87

A study on computational formal verification for practical cryptographic protocol: The case of synchronous RFID authentication

Author keywords

Authentication; Desynchronization; Formal proofs; Light weight; Privacy; RFID

Indexed keywords

COMPUTATIONAL ASSUMPTIONS; COMPUTATIONAL TOOLS; CRYPTOGRAPHIC PROTOCOLS; DESYNCHRONIZATION; FORMAL PROOFS; FORMAL SECURITY ANALYSIS; FORMAL VERIFICATION TOOLS; FORMAL VERIFICATIONS; LIGHT WEIGHT; MAN IN THE MIDDLES (MITM); RECENT PROGRESS; RFID AUTHENTICATION; SECURITY MODEL; SECURITY PROOFS; THREE MODELS; VERIFICATION RESULTS; VERIFICATION TOOLS;

EID: 84861453094     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29889-9_7     Document Type: Conference Paper
Times cited : (8)

References (19)
  • 2
    • 17644411480 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL, pp. 104-115 (2001)
    • (2001) POPL , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 3
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
    • Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. Springer, Heidelberg
    • Abadi, M., Rogaway, P.: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). In:Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, vol. 1872, pp. 3-22. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 77957559043 scopus 로고    scopus 로고
    • Analysing unlinkability and anonymity using the applied pi calculus
    • Arapinis, M., Chothia, T., Ritter, E., Ryan, M.: Analysing unlinkability and anonymity using the applied pi calculus. In: CSF, pp. 107-121 (2010)
    • (2010) CSF , pp. 107-121
    • Arapinis, M.1    Chothia, T.2    Ritter, E.3    Ryan, M.4
  • 8
    • 33749579704 scopus 로고    scopus 로고
    • Automated Security Proofs with Sequences of Games
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Blanchet, B., Pointcheval, D.: Automated Security Proofs with Sequences of Games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 537-554. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 537-554
    • Blanchet, B.1    Pointcheval, D.2
  • 9
    • 77957584097 scopus 로고    scopus 로고
    • Formal verification of privacy for RFID systems
    • Brusò, M., Chatzikokolakis, K., den Hartog, J.: Formal verification of privacy for RFID systems. In: CSF, pp. 75-88 (2010)
    • (2010) CSF , pp. 75-88
    • Brusò, M.1    Chatzikokolakis, K.2    Den Hartog, J.3
  • 10
    • 0019649307 scopus 로고
    • On the Security of Public Key Protocols
    • Dolev, D., Yao, A.C.-C.: On the Security of Public Key Protocols. In: FOCS 1981, pp. 350-357 (1981)
    • (1981) FOCS 1981 , pp. 350-357
    • Dolev, D.1    Yao, A.C.-C.2
  • 13
    • 34748832806 scopus 로고    scopus 로고
    • Defining strong privacy for RFID
    • ePrint Archive, Report 2006/137
    • Juels, A., Weis, S.: Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006/137 (2006)
    • (2006) Cryptology
    • Juels, A.1    Weis, S.2
  • 15
    • 77956148457 scopus 로고    scopus 로고
    • How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC
    • Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. Springer, Heidelberg
    • Matsuo, S., Miyazaki, K., Otsuka, A., Basin, D.: How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 182-194. Springer, Heidelberg (2010), http://www.springerlink.com/content/ 05t7653287066880/
    • (2010) LNCS , vol.6054 , pp. 182-194
    • Matsuo, S.1    Miyazaki, K.2    Otsuka, A.3    Basin, D.4
  • 16
    • 84861450946 scopus 로고    scopus 로고
    • Robust RFID authentication protocol with formal proof and its feasibility
    • ePrint Archive, Report 2010/345
    • Ohkubo, M., Matsuo, S., Hanatani, Y., Sakiyama, K., Ohta, K.: Robust RFID authentication protocol with formal proof and its feasibility. Cryptology ePrint Archive, Report 2010/345 (2010)
    • (2010) Cryptology
    • Ohkubo, M.1    Matsuo, S.2    Hanatani, Y.3    Sakiyama, K.4    Ohta, K.5
  • 19
    • 38149038702 scopus 로고    scopus 로고
    • On Privacy Models for RFID
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.