Cryptology ePrint Archive: Report 2005/171
Available versions in chronological order
20050610:175122 (posted 10-Jun-2005 17:51:22 UTC)
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
20050612:072633 (posted 12-Jun-2005 07:26:33 UTC)
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
20050820:055949 (posted 20-Aug-2005 05:59:49 UTC)
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
20050820:062355 (posted 20-Aug-2005 06:23:55 UTC)
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
20050820:071855 (posted 20-Aug-2005 07:18:55 UTC)
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
20050902:012136 (posted 02-Sep-2005 01:21:36 UTC)
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
Publication Info: Extended abstract published in 3rd ACM Workshop on Formal Methods in Security Engineering
20050902:012254 (posted 02-Sep-2005 01:22:54 UTC)
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
Publication Info: Extended abstract of this paper was published in 3rd ACM Workshop on Formal Methods in Security Engineering.
20050915:155855 (posted 15-Sep-2005 15:58:55 UTC)
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
Publication Info: Extended abstract of this paper was published in 3rd ACM Workshop on Formal Methods in Security Engineering.
20050915:155955 (posted 15-Sep-2005 15:59:55 UTC)
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
Publication Info: Extended abstract of this paper was published in the 3rd ACM Workshop on Formal Methods in Security Engineering
20050915:160056 (posted 15-Sep-2005 16:00:56 UTC)
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
Publication Info: Extended abstract of this paper was published in the 3rd ACM Workshop on Formal Methods in Security Engineering
[
Cryptology ePrint archive
]