Proof Techniques for Cryptographic Protocols

  • Authors:
  • Kevin J. Compton;Scott Dexter

  • Affiliations:
  • -;-

  • Venue:
  • ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

We give a general introduction to cryptographic protocols and the kinds of attacks to which they are susceptible. We then present a framework based on linear logic programming for analyzing authentication protocols and show how various notions of attack are expressed in this framework.