Refining Key Establishment | IEEE Conference Publication - IEEE Xplore
ieeexplore.ieee.org › document
We use refinement to systematically develop a family of key establishment protocols using a theorem prover. Our development spans four levels of ...
Abstract—We use refinement to systematically develop a family of key establishment protocols using a theorem prover. Our development spans four levels of ...
We use refinement to systematically develop a family of key establishment protocols using a theorem prover. Our devel- opment spans four levels of abstraction: ...
We use refinement to systematically develop a family of key establishment protocols using a theorem prover. Our development spans four levels of abstraction.
People also ask
What is a key establishment?
What are the methods of key establishment?
Why is key establishment a vital element of modern encryption?
We use refinement to systematically develop a family of key establishment protocols using a theorem prover. Our development spans four levels of ...
A collection of security conferences and talks since 1969.
Refining Key Establishment. Mendeley · CSV · RIS · BibTeX ; Download. Text (PDF, 461.2Kb) ; Author. Sprenger, Christoph · Basin, David ; Date. 2012 ; Type.
Key establishment techniques known as key transport mechanisms directly employ symmetric encryption (Chapter 7) or public- key encryption (Chapter 8).
Abstract. We propose a development method for security protocols based on stepwise refinement. Our refinement strategy transforms abstract security goals ...
We formalized a supporting infrastructure in the theorem prover Isabelle/HOL [15] and used it to develop basic authentication and key establishment protocols.