User Tools

Site Tools


Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents (BibTeX)

@INPROCEEDINGS{ChevalierKuestersRusinowitchTuruani-FSTTCS-2003,
  author = {Y.~Chevalier and R.~K{\"u}sters and M.~Rusinowitch and M.~Turuani},
  title = {{Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents}},
  booktitle = {FSTTCS 2003: Foundations of Software Technology and Theoretical
               Computer Science},
  year = 2003,
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = 2914,
  pages = {124-135},
  editor = {P.K.~Pandya and J.~Radhakrishnan},
  abstract = {We present an NP decision procedure for the formal analysis of protocols in presence of modular exponentiation with products allowed in exponents. The number of factors that may appear in the products is unlimited. We illustrate that our model is powerful enough to uncover known attacks on the A-GDH.2 protocol suite.}
}