Taming the Adversary

@inproceedings{Abadi2000TamingTA,
  title={Taming the Adversary},
  author={Mart{\'i}n Abadi},
  booktitle={CRYPTO},
  year={2000}
}
While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the explanations are informal; others are embodied in formal methods, particularly in formal methods for the analysis of security protocols. This note (intended to accompany a talk at the Crypto 2000 conference) describes some of those explanations. It focuses on simple models of attacks, pointing to partial justifications of these… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 38 references

Amadio and Denis Lugiez . On the reachability problem in cryptographic protocols

  • Manuel Blum, Silvio Micali
  • 2000

Authentication tests

  • Joshua D. Guttman, F. Javier Thayer Fábrega
  • IEEE Symposium on Security and Privacy,
  • 2000
1 Excerpt

Efficient infinite-state analysis of security protocols

  • Antti Huima
  • Presented at the 1999 Workshop on Formal Methods…
  • 1999
1 Excerpt

Similar Papers

Loading similar papers…