scyther/gui/Protocols/README.txt

7 lines
260 B
Plaintext

The protocols here are modeled according to their description in the
SPORE library.
In the 'key-compromise' directory one can find the same protocols, but
modified to model the compromise of earlier sessions and the leakage of
the corresponding local values.