We present CASRUL, a compiler for cryptographic protocols specifications. Its purpose is to verify the executability of protocols and to translate them into rewrite rules that can be used by several kinds of automatic or semi-automatic tools for finding design flaws. We also present a related comple
✦ LIBER ✦
Vulnerabilities of one cryptographic protocol
✍ Scribed by D. V. Kop’ev
- Book ID
- 111494943
- Publisher
- Allerton Press Inc
- Year
- 2009
- Tongue
- English
- Weight
- 997 KB
- Volume
- 64
- Category
- Article
- ISSN
- 0027-1322
No coin nor oath required. For personal study only.
📜 SIMILAR VOLUMES
The Practice of Cryptographic Protocol V
✍
Michael Rusinowitch
📂
Article
📅
2003
🏛
Elsevier Science
🌐
English
⚖ 119 KB
Several cryptographic applications ofΣ-p
✍
Chunming Tang; Zheng-an Yao
📂
Article
📅
2009
🏛
Academy of Mathematics and Systems Science, Chines
🌐
English
⚖ 313 KB
Proof of soundness (integrity) of crypto
✍
G. J. Simmons
📂
Article
📅
1994
🏛
Springer
🌐
English
⚖ 592 KB
In 1990 a workshop on the Mathematical Concepts (or Principles) of Dependable Systems was held at the Mathematisches Forschungsinstitut Oberwolfach in Germany. The purpose of the workshop was to examine mathematical techniques developed to make it possible to prove the proper functioning of complex
Security and Composition of Multiparty C
✍
Ran Canetti
📂
Article
📅
2000
🏛
Springer
🌐
English
⚖ 326 KB
Secrecy of cryptographic protocols under
✍
H. Houmani; M. Mejri; H. Fujita
📂
Article
📅
2009
🏛
Elsevier Science
🌐
English
⚖ 366 KB
Verification of cryptographic protocols:
✍
Bruno Blanchet; Andreas Podelski
📂
Article
📅
2005
🏛
Elsevier Science
🌐
English
⚖ 305 KB