Analysis of real-world security protocols in a universal composability framework:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Berlin
Logos-Verl.
2013
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XII, 327 S. 24 cm |
ISBN: | 9783832534684 3832534687 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041725982 | ||
003 | DE-604 | ||
005 | 20140327 | ||
007 | t | ||
008 | 140310s2013 gw m||| 00||| eng d | ||
015 | |a 13,N30 |2 dnb | ||
015 | |a 14,A05 |2 dnb | ||
015 | |a 14,H02 |2 dnb | ||
016 | 7 | |a 1037219570 |2 DE-101 | |
020 | |a 9783832534684 |c kart. : EUR 45.00 (DE), EUR 46.30 (AT), sfr 59.90 (freier Pr.) |9 978-3-8325-3468-4 | ||
020 | |a 3832534687 |9 3-8325-3468-7 | ||
024 | 3 | |a 9783832534684 | |
035 | |a (OCoLC)864516213 | ||
035 | |a (DE-599)DNB1037219570 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Tuengerthal, Max |d 1981- |e Verfasser |0 (DE-588)1046397885 |4 aut | |
245 | 1 | 0 | |a Analysis of real-world security protocols in a universal composability framework |c by Max Tuengerthal |
264 | 1 | |a Berlin |b Logos-Verl. |c 2013 | |
300 | |a XII, 327 S. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |a Zugl.: Trier, Univ., Diss., 2013 | ||
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Private-Key-Kryptosystem |0 (DE-588)4317451-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselaustauschprotokoll |0 (DE-588)1029440018 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Berechenbarkeit |0 (DE-588)4138368-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Korrektheit |0 (DE-588)4240223-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 2 | |a Korrektheit |0 (DE-588)4240223-2 |D s |
689 | 0 | 3 | |a Berechenbarkeit |0 (DE-588)4138368-0 |D s |
689 | 0 | 4 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 0 | 5 | |a Schlüsselaustauschprotokoll |0 (DE-588)1029440018 |D s |
689 | 0 | 6 | |a Private-Key-Kryptosystem |0 (DE-588)4317451-6 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4383940&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027172853&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027172853 |
Datensatz im Suchindex
_version_ | 1809769337533235200 |
---|---|
adam_text |
CONTENTS
1. INTRODUCTION 1
2. THE IITM MODEL 7
2.1. THE GENERAL COMPUTATIONAL MODEL 7
2.2. POLYNOMIAL TIME AND PROPERTIES OF SYSTEMS 10
2.3. NOTIONS OF UNIVERSAL COMPOSABILITY 12
2.4. COMPOSITION THEOREMS 13
3. PRELIMINARIES 17
3.1. NOTATION FOR THE DEFINITION OF IITMS 17
3.1.1. PSEUDOCODE 17
3.1.2. PARTS OF IITMS 17
3.1.3. RUNNING EXTERNAL CODE 20
3.2. STANDARD SECURITY NOTIONS FOR CRYPTOGRAPHIC PRIMITIVES 20
3.2.1. SYMMETRIC ENCRYPTION 21
3.2.2. PUBLIC-KEY ENCRYPTION 22
3.2.3. DIGITAL SIGNATURES 23
3.2.4. MESSAGE AUTHENTICATION CODES 24
3.2.5. PSEUDORANDOM FUNCTIONS 25
3.3. LEAKAGE ALGORITHMS 25
4. MODULAR PROTOCOL ANALYSIS IN THE IITM MODEL 29
4.1. MODELING PROTOCOLS 30
4.1.1. ADDRESSING OF MULTIPLE SESSIONS 30
4.1.2. SECURITY PROOFS USING COMPOSITION THEOREMS 31
4.1.3. SUBPROTOCOLS AND IDEAL FUNCTIONALITIES 31
4.1.4. MODELING CORRUPTION 33
4.1.5. COMPOSITION WITH JOINT STATE 34
4.2. IDEAL FUNCTIONALITIES FOR CRYPTOGRAPHIC PRIMITIVES 37
4.2.1. PUBLIC-KEY ENCRYPTION 39
4.2.2. DIGITAL SIGNATURES 44
4.2.3. SYMMETRIC ENCRYPTION 48
4.2.4. MESSAGE AUTHENTICATION CODES 53
4.2.5. KEY DERIVATION 56
4.2.6. JOINT STATE REALIZATIONS 59
4.2.7. NONCES 65
HTTP://D-NB.INFO/1037219570
X
CONTENTS
4.3. IDEAL FUNCTIONALITIES FOR KEY EXCHANGE AND SECURE CHANNEL PROTOCOLS
67
4.3.1. KEY EXCHANGE 67
4.3.2. KEY USABILITY 69
4.3.3. SECURE CHANNEL 71
4.4. SECURITY ANALYSIS OF AN EXAMPLE PROTOCOL 73
4.4.1. OUR SIMPLE KEY EXCHANGE PROTOCOL (OSKE) 74
4.4.2. MODELING OSKE IN THE HTM MODEL 74
4.4.3. SECURITY OF OSKE 75
4.4.4. BUILDING SECURE CHANNELS FROM KEY EXCHANGE PROTOCOLS . 80
5. AN IDEAL FUNCTIONALITY FOR CRYPTOGRAPHIC PRIMITIVES 83
5.1. PRELIMINARIES 84
5.1.1. KEY TYPES AND DOMAINS 84
5.1.2. PLAINTEXT FORMATTING AND PARSING 85
5.1.3. SALT PARSING 87
5.2. THE IDEAL CRYPTO FUNCTIONALITY 87
5.2.1. PARAMETERS 87
5.2.2. BRIEF DESCRIPTION 88
5.2.3. DETAILED DESCRIPTION 90
5.2.4. DETAILED DESCRIPTION OF THE PROVIDED OPERATIONS 93
5.2.5. REMARKS 99
5.3. REALIZATION OF THE IDEAL CRYPTO FUNCTIONALITY 101
5.3.1. THE REALIZATION 101
5.3.2. PROOF OF REALIZATION 105
5.4. JOINT STATE REALIZATION OF THE IDEAL CRYPTO FUNCTIONALITY 110
5.5. RELATED WORK 112
6. COMPUTATIONAL SOUNDNESS FOR KE PROTOCOLS WITH SYMMETRIC ENCRYPTION
115
6.1. THE SYMBOLIC MODEL 116
6.1.1. SYNTAX 117
6.1.2. OPERATIONAL SEMANTICS 119
6.1.3. DEDUCTION, STATIC EQUIVALENCE, AND LABELED BISIMILARITY . . . 120
6.2. SYMBOLIC PROTOCOLS 122
6.3. COMPUTATIONAL INTERPRETATION OF SYMBOLIC PROTOCOLS 124
6.4. THE COMPUTATIONAL SOUNDNESS RESULT 131
6.5. PROOF OF THE COMPUTATIONAL SOUNDNESS RESULT 135
6.5.1. MAPPING LEMMAS 136
6.5.2. PROOF OF THEOREM 6.1 145
6.6. RELATED WORK 148
7. PROTOCOL ANALYSIS WITHOUT PRE-ESTABLISHED SESSION IDENTIFIERS 151
7.1. ON THE ROLE OF SIDS IN UNIVERSAL COMPOSITION THEOREMS 152
7.2. MULTI-SESSION LOCAL-SID IDEAL FUNCTIONALITIES 154
7.3. MULTI-SESSION REAL PROTOCOLS 158
CONTENTS XI
7.4. ANALYZING KEY EXCHANGE PROTOCOLS BASED ON OUR CRYPTO FUNCTIONALITY
160
7.4.1. KEY EXCHANGE PROTOCOLS 161
7.4.2. A CRITERION FOR SECURE KEY EXCHANGE PROTOCOLS 163
7.4.3. APPLICATION: SECURITY ANALYSIS OF THE 4WHS PROTOCOL OF WPA2 170
7.5. UNIVERSAL COMPOSITION WITHOUT PRE-ESTABLISHED SIDS 178
7.5.1. CLASS OF REAL PROTOCOLS 178
7.5.2. SINGLE-SESSION REALIZABILITY 180
7.5.3. THE UNIVERSAL COMPOSITION THEOREM 182
7.6. JOINT STATE COMPOSITION WITHOUT PRE-ESTABLISHED SIDS 183
7.6.1. PRELIMINARIES 185
7.6.2. IMPLICIT DISJOINTNESS 195
7.6.3. THE COMPOSITION THEOREM WITH JOINT STATE 200
7.7. APPLICATIONS OF OUR COMPOSITION THEOREMS 202
7.7.1. APPLICATIONS TO KEY EXCHANGE AND SECURE CHANNEL PROTOCOLS 202
7.7.2. CASE STUDIES ON REAL-WORLD SECURITY PROTOCOLS 203
7.8. RELATED WORK 225
8. CONCLUSION 227
BIBLIOGRAPHY 229
A. REALIZATIONS OF LONG-TERM KEY FUNCTIONALITIES 241
A.L. PROOF OF THEOREM 4.3 241
A.2. PROOF OF THEOREM 4.4 246
A.3. PROOF OF THEOREM 4.5 248
B. DETAILS AND A PROOF FOR OUR CRYPTO FUNCTIONALITY 253
B.L. FORMAL SPECIFICATION OF THE IDEAL CRYPTO FUNCTIONALITY 253
B.2. PROOF OF THEOREM 5.1 261
C. DETAILS AND PROOFS FOR OUR COMPUTATIONAL SOUNDNESS RESULT 273
C.L. COMPUTATIONAL INTERPRETATION OF SYMBOLIC PROTOCOLS 273
C.2. APPLICATIONS 277
C.2.1. OUR SIMPLE KEY EXCHANGE PROTOCOL (OSKE) 277
C.2.2. THE ANSSK' PROTOCOL 279
C.3. PROOF OF LEMMA 6.3 282
C.3.1. PROOF OF (6.1) AND (6.2) 282
C.3.2. PROOF OF (6.3) 285
C.4. PROOF OF COROLLARY 6.2 286
D. DETAILS AND PROOFS FOR PROTOCOL ANALYSIS WITHOUT PRE-ESTABLISHED SIDS
289
D.L. PROOF OF THEOREM 7.4 289
D.2. PROOF OF THEOREM 7.5^ 300
D.2.1. STEP 1: \ V | CRYPTO = \QT 301
XII CONTENTS
D.2.2. STEP 2: \Q
T
= \S\J
R
314
D.3. APPLICATIONS 319
D.3.1. THE NEEDHAM-SCHROEDER PUBLIC-KEY PROTOCOL 320
D.3.2. BUILDING SECURE CHANNELS FROM KEY EXCHANGE PROTOCOLS . . . 321
D.3.3. COLLISION RESISTANT HASH FUNCTIONS 327 |
any_adam_object | 1 |
author | Tuengerthal, Max 1981- |
author_GND | (DE-588)1046397885 |
author_facet | Tuengerthal, Max 1981- |
author_role | aut |
author_sort | Tuengerthal, Max 1981- |
author_variant | m t mt |
building | Verbundindex |
bvnumber | BV041725982 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)864516213 (DE-599)DNB1037219570 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV041725982</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140327</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140310s2013 gw m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,N30</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">14,A05</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">14,H02</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1037219570</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783832534684</subfield><subfield code="c">kart. : EUR 45.00 (DE), EUR 46.30 (AT), sfr 59.90 (freier Pr.)</subfield><subfield code="9">978-3-8325-3468-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3832534687</subfield><subfield code="9">3-8325-3468-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783832534684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864516213</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1037219570</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tuengerthal, Max</subfield><subfield code="d">1981-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1046397885</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Analysis of real-world security protocols in a universal composability framework</subfield><subfield code="c">by Max Tuengerthal</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Logos-Verl.</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 327 S.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Trier, Univ., Diss., 2013</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Private-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4317451-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselaustauschprotokoll</subfield><subfield code="0">(DE-588)1029440018</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Berechenbarkeit</subfield><subfield code="0">(DE-588)4138368-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Korrektheit</subfield><subfield code="0">(DE-588)4240223-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Korrektheit</subfield><subfield code="0">(DE-588)4240223-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Berechenbarkeit</subfield><subfield code="0">(DE-588)4138368-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Schlüsselaustauschprotokoll</subfield><subfield code="0">(DE-588)1029440018</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Private-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4317451-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4383940&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027172853&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027172853</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV041725982 |
illustrated | Not Illustrated |
indexdate | 2024-09-10T01:08:55Z |
institution | BVB |
isbn | 9783832534684 3832534687 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027172853 |
oclc_num | 864516213 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | XII, 327 S. 24 cm |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Logos-Verl. |
record_format | marc |
spelling | Tuengerthal, Max 1981- Verfasser (DE-588)1046397885 aut Analysis of real-world security protocols in a universal composability framework by Max Tuengerthal Berlin Logos-Verl. 2013 XII, 327 S. 24 cm txt rdacontent n rdamedia nc rdacarrier Zugl.: Trier, Univ., Diss., 2013 Formale Methode (DE-588)4333722-3 gnd rswk-swf Private-Key-Kryptosystem (DE-588)4317451-6 gnd rswk-swf Schlüsselaustauschprotokoll (DE-588)1029440018 gnd rswk-swf Berechenbarkeit (DE-588)4138368-0 gnd rswk-swf Korrektheit (DE-588)4240223-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Sicherheitsprotokoll (DE-588)4709127-7 s Kryptologie (DE-588)4033329-2 s Korrektheit (DE-588)4240223-2 s Berechenbarkeit (DE-588)4138368-0 s Formale Methode (DE-588)4333722-3 s Schlüsselaustauschprotokoll (DE-588)1029440018 s Private-Key-Kryptosystem (DE-588)4317451-6 s DE-604 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4383940&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027172853&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Tuengerthal, Max 1981- Analysis of real-world security protocols in a universal composability framework Formale Methode (DE-588)4333722-3 gnd Private-Key-Kryptosystem (DE-588)4317451-6 gnd Schlüsselaustauschprotokoll (DE-588)1029440018 gnd Berechenbarkeit (DE-588)4138368-0 gnd Korrektheit (DE-588)4240223-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4333722-3 (DE-588)4317451-6 (DE-588)1029440018 (DE-588)4138368-0 (DE-588)4240223-2 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)4113937-9 |
title | Analysis of real-world security protocols in a universal composability framework |
title_auth | Analysis of real-world security protocols in a universal composability framework |
title_exact_search | Analysis of real-world security protocols in a universal composability framework |
title_full | Analysis of real-world security protocols in a universal composability framework by Max Tuengerthal |
title_fullStr | Analysis of real-world security protocols in a universal composability framework by Max Tuengerthal |
title_full_unstemmed | Analysis of real-world security protocols in a universal composability framework by Max Tuengerthal |
title_short | Analysis of real-world security protocols in a universal composability framework |
title_sort | analysis of real world security protocols in a universal composability framework |
topic | Formale Methode (DE-588)4333722-3 gnd Private-Key-Kryptosystem (DE-588)4317451-6 gnd Schlüsselaustauschprotokoll (DE-588)1029440018 gnd Berechenbarkeit (DE-588)4138368-0 gnd Korrektheit (DE-588)4240223-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Formale Methode Private-Key-Kryptosystem Schlüsselaustauschprotokoll Berechenbarkeit Korrektheit Kryptologie Sicherheitsprotokoll Hochschulschrift |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4383940&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027172853&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT tuengerthalmax analysisofrealworldsecurityprotocolsinauniversalcomposabilityframework |