<--- Back to Details
First PageDocument Content
Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data
Date: 2013-04-29 11:09:46
Burrows–Abadi–Needham logic
Needham–Schroeder protocol
Public-key cryptography
Cryptographic nonce
XTR
Deniable authentication
Security protocol notation
Wide Mouth Frog protocol
Cryptographic protocols
Cryptography
Data

NRL Release Number[removed]The Logic of Authentication Protocols ?

Add to Reading List

Source URL: www.nrl.navy.mil

Download Document from Source Website

File Size: 492,12 KB

Share Document on Facebook

Similar Documents

Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Communications protocol / Logic / Security protocol notation

JuneEncryption as an Abstract Datatype: an extended abstract

DocID: 1lA3m - View Document

Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

DocID: 1klGo - View Document

Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

DocID: 1jYjV - View Document

Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

DocID: 1jpet - View Document

2011 Paper 7 Question 12 Security II (a) Write out the Needham–Schroder protocol, explaining the notation you use. [5 marks] (b) Describe the “bug” in the protocol, stating why some people consider it to be

DocID: 1eTxF - View Document