Automated identification of desynchronisation attacks on shared secrets
From MaRDI portal
Publication:2167739
DOI10.1007/978-3-319-99073-6_20zbMath1496.68071OpenAlexW2887371184MaRDI QIDQ2167739
Rolando Trujillo-Rasua, Sjouke Mauw, Zach Smith, Jorge Toro-Pozo
Publication date: 25 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-319-99073-6_20
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Computer security (68M25)
Cites Work
- Order-sorted algebra. I: Equational deduction for multiple inheritance, overloading, exceptions and partial operations
- Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags
- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
- On the security of public key protocols
This page was built for publication: Automated identification of desynchronisation attacks on shared secrets