Cryptology ePrint Archive: Report 2012/316
Available versions in chronological order
20120605:165521 (posted 05-Jun-2012 16:55:21 UTC)
Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker
Gergei Bana and Pedro Ad\~ao and Hideki Sakurada
20120605:170313 (posted 05-Jun-2012 17:03:13 UTC)
Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker
Gergei Bana and Pedro Adão and Hideki Sakurada
20120711:114724 (posted 11-Jul-2012 11:47:24 UTC)
Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker
Gergei Bana and Pedro Adão and Hideki Sakurada
20120801:151022 (posted 01-Aug-2012 15:10:22 UTC)
Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker
Gergei Bana and Pedro Adão and Hideki Sakurada
20120802:204515 (posted 02-Aug-2012 20:45:15 UTC)
Computationally Complete Symbolic Attacker in Action
Gergei Bana and Pedro Adão and Hideki Sakurada
20120802:205730 (posted 02-Aug-2012 20:57:30 UTC)
Computationally Complete Symbolic Attacker in Action
Gergei Bana and Pedro Adão and Hideki Sakurada
20121029:161901 (posted 29-Oct-2012 16:19:01 UTC)
Computationally Complete Symbolic Attacker in Action
Gergei Bana and Pedro Adão and Hideki Sakurada
[
Cryptology ePrint archive
]