On the security of ping-pong protocols
From MaRDI portal
Publication:3323837
DOI10.1016/S0019-9958(82)90401-6zbMath0537.94012OpenAlexW1975688140MaRDI QIDQ3323837
Shimon Even, Danny Dolev, Richard M. Karp
Publication date: 1982
Published in: Information and Control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0019-9958(82)90401-6
algorithmcryptologysequence of operatorspublic-key encryptions and decryptionssecurity of ping-pong protocols
Related Items
On the verifiability of two-party algebraic protocols, Model Checking Security Protocols, On the security of p-party protocols, Decidability issues for extended ping-pong protocols, A collusion problem and its solution, Chasing Diagrams in Cryptography, Tree automata with one memory set constraints and cryptographic protocols, Cancellation rules and extended word problems, On the complexity of some extended word problems defined by cancellation rules, Ping-pong protocols as prefix grammars: modelling and verification via program transformation, Interconvertibility of a class of set constraints and context-free-language reachability, On the symbolic reduction of processes with cryptographic functions., On the security of name-stamp protocols