Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR (1996)

Cached

Download Links

by Gavin Lowe
Citations:611 - 11 self

Active Bibliography

188 A Hierarchy of Authentication Specifications – Gavin Lowe - 1997
Introduction to Foundations of Security Protocols – R. Ramanujam, S. P. Suresh
Static Analyses of Cryptographic Protocols – Jay McCarthy - 2009
33 Efficient Infinite-State Analysis of Security Protocols – Antti Huima - 1999
2 Attacking Authentication Protocols – John Clark - 1996
6 Variations on the Themes of Message Freshness and Replay - or the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols – Li Gong - 1993
84 Programming Satan's Computer – Ross Anderson, Roger Needham
3 Methodical Use of Cryptographic Transformations in Authentication Protocols – Wenbo Mao, Colin Boyd - 1995
6 Comparing State Spaces in Automatic Security Protocol Verification – Cas J. F. Cremers, Pascal Lafourcade
91 Some New Attacks upon Security Protocols – Gavin Lowe - 1996
35 Static validation of security protocols – Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson - 2005
3 The Design, Implementation, And Evaluation Of Cryptographic Distributed Applications: Secure PVM – Nair Venugopal - 1996
6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
Design and Performance Evaluation of the Nested Certification . . . – Albert Levi - 1999
7 Lower Bounds on Messages and Rounds for Network Authentication Protocols – Li Gong - 1993
210 An Attack on the Needham-Schroeder Public-Key Authentication Protocol – Gavin Lowe - 1995
23 Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations – Li Gong - 1995
82 Fail-Stop Protocols: An Approach to Designing Secure Protocols – Li Gong - 1994
14 Cryptography and Evidence – Michael Roe, George A. Lear - 1997