词条 | Tamarin Prover |
释义 |
| name = Tamarin Prover | title = Tamarin Prover | logo = Tamarin_Prover_Logo.png | screenshot = Tamarin_Prover_Screenshot.png | caption = | collapsible = | author = David Basin, Cas Cremers, Jannik Dreier, Simon Meier, Ralf Sasse, Benedikt Schmidt | developer = Cas Cremers, Jannik Dreier, Ralf Sasse | released = {{Start date|2012|04|24}} | discontinued = | latest release version = 1.2.2 | latest release date = {{release date|2017|05|29}} | latest preview version = 1.3.0 ({{URL|https://github.com/tamarin-prover/tamarin-prover}}) | latest preview date = | programming language = Haskell | operating system = Linux, macOS | platform = | size = | language = English | genre = Automated reasoning | license = GNU GPL v3 | website = {{url|tamarin-prover.github.io}} | repo = {{URL|https://github.com/tamarin-prover/tamarin-prover}} }}Tamarin Prover is a computer software program for formal verification of cryptographic protocols. It has been used to verify Transport Layer Security 1.3,[1] ISO/IEC 9798,[2] and DNP3 Secure Authentication v5.[3][4][5][6] References1. ^{{cite conference |last1=Cremers |first1=Cas |last2=Horvat |first2=Marko |last3=Scott |first3=Sam |last4=van der Merwe |first4=Thyla |date=2016 |title=Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication |url=https://tls13tamarin.github.io/TLS13Tamarin/ |book-title=IEEE Symposium on Security and Privacy, 2016, San Jose, CA, USA, May 22-26, 2016 |pages=470--485 |conference=IEEE S&P 2016 |isbn=978-1-5090-0824-7 |doi=10.1109/SP.2016.35}} 2. ^{{cite journal |last1=Basin |first1=David |last2=Cremers |first2=Cas |last3=Meier |first3=Simon |date=2013 |title=Provably repairing the ISO/IEC 9798 standard for entity authentication |url=https://www.cs.ox.ac.uk/people/cas.cremers/downloads/papers/BCM2013-iso9798-JCS.pdf |journal=Journal of Computer Security |volume=21 |pages=817--846 |doi=10.3233/JCS-130472}} 3. ^{{cite conference |url=http://www.cs.ox.ac.uk/people/cas.cremers/downloads/papers/CrDeMi2017-DNP3-extended.pdf |title= Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5 |last1=Cremers |first1=Cas |author-link1=Cas Cremers |last2=Dehnel-Wild |first2=Martin |last3=Milner |first3=Kevin |date=2017 |publisher=Springer |book-title=Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I |pages=389--407 |isbn=978-3-319-66401-9 |location=Oslo, Norway |conference=[https://www.ntnu.edu/esorics2017 ESORICS 2017] |doi=10.1007/978-3-319-66402-6_23}} 4. ^{{cite conference |url=https://www.cs.ox.ac.uk/people/cas.cremers/downloads/papers/ScMeCrBa2012-tamarin.pdf |title=Automated analysis of Diffie-Hellman protocols and advanced security properties |last1=Schmidt |first1=Benedikt |last2=Meier |first2=Simon |last3=Cremers |first3=Cas |author-link3=Cas Cremers |last4=Basin |first4=David |date=2012 |publisher=IEEE Computer Society |book-title=25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012 |pages=78--94 |location=Cambridge, MA |conference=CSF 2012}} 5. ^{{cite thesis |last=Schmidt |first=Benedikt |date=2012 |title=Formal analysis of key exchange protocols and physical protocols |type=PhD thesis |url=https://doi.org/10.3929/ethz-a-009898924 |access-date=2017-09-24}} 6. ^{{cite thesis |last=Meier |first=Simon |date=2012 |title=Advancing automated security protocol verification |type=PhD thesis|url=https://doi.org/10.3929/ethz-a-009790675 |access-date=2017-09-24}} External links
2 : Cryptographic software|Free software |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。