Cryptographic protocols
Prikladnaâ diskretnaâ matematika, no. 11 (2009), pp. 115-150.

Voir la notice de l'article provenant de la source Math-Net.Ru

The lecture discusses the main properties and vulnerabilities of cryptographic protocols. Some well known examples of attacks on cryptographic protocols are considered. The second part of the lecture contains an overview of modern protocol verification tools.
@article{PDM_2009_11_a4,
     author = {A. V. Cheremushkin},
     title = {Cryptographic protocols},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {115--150},
     publisher = {mathdoc},
     number = {11},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2009_11_a4/}
}
TY  - JOUR
AU  - A. V. Cheremushkin
TI  - Cryptographic protocols
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2009
SP  - 115
EP  - 150
IS  - 11
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2009_11_a4/
LA  - ru
ID  - PDM_2009_11_a4
ER  - 
%0 Journal Article
%A A. V. Cheremushkin
%T Cryptographic protocols
%J Prikladnaâ diskretnaâ matematika
%D 2009
%P 115-150
%N 11
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2009_11_a4/
%G ru
%F PDM_2009_11_a4
A. V. Cheremushkin. Cryptographic protocols. Prikladnaâ diskretnaâ matematika, no. 11 (2009), pp. 115-150. http://geodesic.mathdoc.fr/item/PDM_2009_11_a4/

[1] Cheremushkin A. V., Kriptograficheskie protokoly. Osnovnye svoistva i uyazvimosti: uchebnoe posobie, Izd. tsentr “Akademiya”, M., 2009, 272 pp.

[2] Index of the security protocols repository (SPORE) Laboratorie Spécification et Vérification, http://www.lsv.ens-cachan.fr/spore/table.html

[3] Clark J., Jacob J., A Survey of Authentication Protocol Literature: Version 1.0. 17 Nov., , 1997 http://www.cs.york.ac.uk/~jac/papers/drareview.ps.gz

[4] Menezes A. J., van Oorschot P. C., Vanstone S. A., Handbook of applied cryptography, CRC Press, Boca Raton–New York–London–Tokyo, 1997, 780 pp. | MR | Zbl

[5] Cremers C. J. F., Lafourcade P., Comparing State Spaces in Automatic Security Protocol Verification, ETH Technical Report. no. 558, 2007, 26 pp. | Zbl