A Reduction for Automated Veri cation of AuthenticationProtocolsScott


Authentication protocols (including protocols that provide key establishment) are designed to work correctly in the presence of an adversary that can (1) perform an unbounded number of encryptions and tuplings while fabricating messages, and (2) prompt honest principals to engage in an unbounded number of concurrent runs of the protocol. The amount of local… (More)


Cite this paper

@inproceedings{Stoller1998ARF, title={A Reduction for Automated Veri cation of AuthenticationProtocolsScott}, author={Scott Stoller}, year={1998} }