gijs ba47af0c42 - Test out a possible way to model key compromise:
Add a role that sends out all messages that would occur in a legit
  run of the protocol including the session key (simulating a previously
  recorded run with its compromised session key)

- Adding a directory to play around with key compromise
2005-06-14 13:51:51 +00:00
2005-03-24 15:25:43 +00:00
Description
Scyther with my modifications
21 MiB
Languages
C 42.9%
Python 28.8%
TeX 14.1%
C++ 9.8%
Shell 1.2%
Other 3.1%