What people are saying - Write a review
We haven't found any reviews in the usual places.
Cryptographic Hash Functions
Unsoundness of BAN logic
Extending GNY Logic
Manytomany Protocols T2
adversary model algorithm Alice and Bob application assumptions authentication logics BAN logic belief binary bits bookshop challenge Chapter CIWLI collision communication complexity Computer Science conﬁdentiality conﬁgurations CRYPTO cryptographic hash function cryptographic primitives cryptographic protocols databases decryption deﬁned deﬁnition denoted difﬁcult disclosing domain efﬁcient encoding encryption example ﬁelds Figure ﬁle ﬁnd ﬁrst ﬂaws formula GNY logic H-BAN hash pool hash value IEEE inference rule information designator input intersection justiﬁed knowledge authentication Lecture Notes length malicious man-in-the-middle attack non-incremental nonce Notes in Computer oblivious transfer ontologies organization paradigm parrots protocol Peggy player police ofﬁcers possible pre-image preﬁx tree private key problem proof properties protocol parser protocol run prove possession public key reﬂect Roger Needham secret Section security protocols semantics sensitive information signature solution speciﬁc strategy T-1 protocol Table thesis tion tocol veriﬁer Victor wants zero-knowledge zero-knowledge proofs