Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or

LICS, pp.271-271, (2003)

Cited by: 240|Views97
EI

Abstract

We present decidability results for the verification ofcryptographic protocols in the presence of equational theoriescorresponding to xorand Abelian groups. Since theperfect cryptography assumption is unrealistic for cryptographicprimitives with visible algebraic properties such asxor, we extend the conventional Dolev-Yao model by permitt...More

Code:

Data:

Your rating :
0

 

Tags
Comments
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn
小科