On the Security of Multi-Party Ping-Pong Protocols (1985)

Cached

Download Links

by Shimon Even , Oded Goldreich
Citations:59 - 1 self

Documents Related by Co-Citation

1044 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
406 The inductive approach to verifying cryptographic protocols – Lawrence C. Paulson - 1998
613 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
783 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
52 On the security of ping-pong protocols – S Even D Dolev, R M Karp - 1982
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
56 Cryptographic Protocols – M Merritt - 1983
263 Automated Analysis of Cryptographic Protocols Using Murphi – John C. Mitchell, Mark Mitchell, Ulrich Stern - 1997
135 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millan - 1994
84 On the Reachability Problem in Cryptographic Protocols – Roberto M. Amadio, Roberto M. Amadio, Denis Lugiez, Denis Lugiez, Thème Réseaux Et Systèmes, Unité Inria, Sophia Antipolis - 2000
142 A meta-notation for protocol analysis – I. Cervesato, N. A. Durgin, P. D. Lincoln, J. C. Mitchell, A. Scedrov - 1999
333 Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) – Martín Abadi, Phillip Rogaway - 2000
862 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
125 Undecidability of bounded security protocols – N A Durgin, P D Lincoln, J C Mitchell, A Scedrov - 1999
85 Soundness of formal encryption in the presence of active adversaries – Daniele Micciancio, Bogdan Warinschi - 2004
133 A Composable Cryptographic Library with Nested Operations (Extended Abstract) – Michael Backes, Birgit Pfitzmann, Michael Waidner - 2003
111 Towards a Completeness Result for Model Checking of Security Protocols – Gavin Lowe - 1999
83 Applying Formal Methods to the Analysis of a Key Management Protocol – Catherine Meadows - 1992
69 Semantics and Program Analysis of Computationally Secure Information Flow – Peeter Laud - 2001