Login / Signup

What is the best way to prove a cryptographic protocol correct?

Sreekanth MalladiGurdeep S. Hura
Published in: IPDPS (2008)
Keyphrases
  • cryptographic protocols
  • standard model
  • security properties
  • similarity measure
  • authentication protocol