Login / Signup
Superposition Attacks on Cryptographic Protocols
Ivan Damgård
Jakob Funder
Jesper Buus Nielsen
Louis Salvail
Published in:
CoRR (2011)
Keyphrases
</>
cryptographic protocols
security properties
security protocols
standard model
insider attacks
authentication protocol
lightweight
encryption decryption
information systems
digital libraries
wireless sensor networks
model checking