Login / Signup

An E-unification Algorithm for Analyzing Protocols That Use Modular Exponentiation.

Deepak KapurPaliath NarendranLida Wang
Published in: RTA (2003)
Keyphrases
  • computational efficiency
  • anomaly detection
  • hardware implementation