搜索结果: 1-3 共查到“军事学 symbolic analysis”相关记录3条 . 查询时间(0.109 秒)
Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
Cryptographic protocols Security analysis
font style='font-size:12px;'>
2014/3/12
We consider a class of two-party function evaluation protocols in which the parties are allowed to use ideal functionalities as well as a set of powerful primitives, namely commitments, homomorphic en...
Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange
cryptographic protocols Automated Proofs Universal Composition Diffie-Hellman key exchange forward secrecy
font style='font-size:12px;'>
2010/7/13
Canetti and Herzog (TCC'06) show how to efficiently perform fully automated, computationally sound security analysis of key exchange protocols with an unbounded number of sessions. A key tool in their...
Towards computationally sound symbolic analysis of key exchange protocols
cryptographic protocol analysis logic computational soundness
font style='font-size:12px;'>
2009/2/11
We present a cryptographically sound formal method for proving correctness of key exchange
protocols. Our main tool is a fragment of a symbolic protocol logic. We demonstrate
that proofs of key agre...