We show that it is impossible to extend the strong soundness results to XOR, at least not with remotely the same generality and naturalness as for the core ...
Recently significant progress was made in proving that Dolev-Yao models can be sound with respect to actual cryptographic realizations and security definitions.
[PDF] Limits of the Cryptographic Realization of Dolev-Yao-style XOR
citeseerx.ist.psu.edu › document
We show that it is impossible to extend the strong soundness results to XOR, at least not with remotely the same generality and naturalness as for the core ...
Jul 12, 2008 · Limits of the cryptographic realization of Dolev-Yao- style XOR. In Proceedings of 10th European Symposium on Research in Computer Security.
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security ...
We want to show that it is not possible to cryptographically realize a Dolev-Yao model that contains XOR together with other usual cryptographic operations via ...
It is shown that it is impossible to extend the strong soundness results to XOR, at least not with remotely the same generality and naturalness as for the ...
Recently significant progress was made in proving that Dolev-Yao models can be sound with respect to actual cryptographic realizations and security definitions.
(2005) Limits of the Cryptographic Realization of Dolev-Yao-style XOR. In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS).
Aug 10, 2007 · Recently significant progress was made in proving that Dolev-Yao models can be sound with respect to actual cryptographic realizations and ...