A remark about long attacks on ping-pong protocols

Бесплатный доступ

Previously, the author showed that cryptographic pingpong protocols in the Dolev-Yao threat model can be verified through modeling in prefix grammars. The article considers examples of attacks on ping-pong protocols that satisfy the upper bound for the path length generated by the model prefix grammar given in the previous works of the author

Computational complexity, dolev-yao intruder model, ping-pong protocols, protocol security

Короткий адрес: https://sciup.org/14336172

IDR: 14336172

Статья научная