Automatic Analysis of the Security of XOR-Based Key Management Schemes
From MaRDI portal
Publication:5758129
DOI10.1007/978-3-540-71209-1_42zbMath1186.68180OpenAlexW2139017685MaRDI QIDQ5758129
Gavin Keighren, Véronique Cortier, Graham Steel
Publication date: 3 September 2007
Published in: Tools and Algorithms for the Construction and Analysis of Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71209-1_42
Related Items (5)
A generic security API for symmetric key management on cryptographic devices ⋮ Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach ⋮ Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives ⋮ Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case ⋮ A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
This page was built for publication: Automatic Analysis of the Security of XOR-Based Key Management Schemes