Relating cryptography and cryptographic protocols: A panel

A. Scedrov*, R. Canetti, J. Guttman, D. Wagner, M. Waidner

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

1 Scopus citations

Abstract

A panel discussion on related approaches to cryptographic protocol analysis is presented. The protocol analysis is based on a model of adversary capabilities that allows nondeterminstic choice of possible actions. Basic assumptions of the model provides an idealized setting for relatively tractable protocol analysis.

Original languageEnglish
Pages (from-to)111
Number of pages1
JournalProceedings of the Computer Security Foundations Workshop
StatePublished - 2001
Externally publishedYes
Event14th IEEE Computer Security Foundations Workshop (CSFW-14) - Cape Brenton, NS, United States
Duration: 11 Jun 200113 Jun 2001

Fingerprint

Dive into the research topics of 'Relating cryptography and cryptographic protocols: A panel'. Together they form a unique fingerprint.

Cite this