Cryptology ePrint Archive: Report 2012/316

Available versions in chronological order


Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker
Gergei Bana and Pedro Ad\~ao and Hideki Sakurada

Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker
Gergei Bana and Pedro Adão and Hideki Sakurada

Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker
Gergei Bana and Pedro Adão and Hideki Sakurada

Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker
Gergei Bana and Pedro Adão and Hideki Sakurada

Computationally Complete Symbolic Attacker in Action
Gergei Bana and Pedro Adão and Hideki Sakurada

Computationally Complete Symbolic Attacker in Action
Gergei Bana and Pedro Adão and Hideki Sakurada

Computationally Complete Symbolic Attacker in Action
Gergei Bana and Pedro Adão and Hideki Sakurada


[ Cryptology ePrint archive ]