Cryptographic protocol

Known as: Cryptographic protocols, Cyptographic protocol, Secure connection 
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2003
Highly Cited
2003
The history of the application of formal methods to cryptographic protocol analysis spans over twenty years, and recently has… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present a new automatic cryptographic protocol verifier based on a simple representation of the protocol by Prolog rules, and… (More)
  • figure 1
  • figure 2
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The reachability problem for cryptographic protocols with non-atomic keys can be solved via a simple constraint satisfaction… (More)
  • figure 3
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We present a method for verifying cryptographic protocols, based on rewriting and on tree automata techniques. Protocols are… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive de nitions. The approach is based… (More)
  • figure 4
Is this relevant?
Highly Cited
1998
Highly Cited
1998
We present general definitions of security for multiparty cryptographic protocols, with focus on the task of evaluating a… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Three experimental methods have been developed to help apply formal methods to the security verification of cryptographic… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
1994
Highly Cited
1994
We present a logic for analyzing cryptographic protocols. This logic encompasses a uni cation of four of its predecessors in the… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Analysis methods for cryptographic protocols have often focused on information leakage rather than on seeing whether a protocol… (More)
Is this relevant?