Files
scyther/gui/Protocols
2010-11-24 17:13:14 +01:00
..

The protocols here are modeled according to their description in the
SPORE library.

In the 'key-compromise' directory one can find the same protocols, but
modified to model the compromise of earlier sessions and the leakage of
the corresponding local values.