Lack of Explicitness Strikes Back (Transcript of Discussion)
暂无分享,去创建一个
[1] Peter Honeyman,et al. Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol , 1998, CARDIS.
[2] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[3] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[4] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[5] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[6] Victor Shoup,et al. Session Key Distribution Using Smart Cards , 1996, EUROCRYPT.
[7] Giampaolo Bella. Modelling Agents' Knowledge Inductively , 1999, Security Protocols Workshop.
[8] Ueli Maurer,et al. Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.
[9] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[10] Silvio Micali,et al. Secret-key agreement without public-key , 1994, CRYPTO 1994.