01.04.2015 Views

Logical Relations for Encryption

Logical Relations for Encryption

Logical Relations for Encryption

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Examples<br />

• Well-known attack on (a bad use of)<br />

Needham-Schroeder public-key protocol<br />

• Correctness proof of (the same use of)<br />

"improved" Needham-Schroeder publickey<br />

protocol<br />

• "Necessarily parallel" attack on ffgg<br />

protocol

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!