Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents

73Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present an NP decision procedure for the formal analysis of protocols in presence of modular exponentiation with products allowed in exponents. The number of factors that may appear in the products is unlimited. We illustrate that our model is powerful enough to uncover known attacks on the A-GDH.2 protocol suite. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Chevalier, Y., Küsters, R., Rusinowitch, M., & Turuani, M. (2003). Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2914, 124–135. https://doi.org/10.1007/978-3-540-24597-1_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free