Cryptographic protocols
Prikladnaâ diskretnaâ matematika, no. 11 (2009), pp. 115-150

Voir la notice de l'article provenant de la source Math-Net.Ru

The lecture discusses the main properties and vulnerabilities of cryptographic protocols. Some well known examples of attacks on cryptographic protocols are considered. The second part of the lecture contains an overview of modern protocol verification tools.
@article{PDM_2009_11_a4,
     author = {A. V. Cheremushkin},
     title = {Cryptographic protocols},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {115--150},
     publisher = {mathdoc},
     number = {11},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2009_11_a4/}
}
TY  - JOUR
AU  - A. V. Cheremushkin
TI  - Cryptographic protocols
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2009
SP  - 115
EP  - 150
IS  - 11
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2009_11_a4/
LA  - ru
ID  - PDM_2009_11_a4
ER  - 
%0 Journal Article
%A A. V. Cheremushkin
%T Cryptographic protocols
%J Prikladnaâ diskretnaâ matematika
%D 2009
%P 115-150
%N 11
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2009_11_a4/
%G ru
%F PDM_2009_11_a4
A. V. Cheremushkin. Cryptographic protocols. Prikladnaâ diskretnaâ matematika, no. 11 (2009), pp. 115-150. http://geodesic.mathdoc.fr/item/PDM_2009_11_a4/