.. | ||
MultiProtocolAttacks | ||
andrew-ban-concrete.spdl | ||
andrew-ban.spdl | ||
andrew-lowe-ban.spdl | ||
andrew.spdl | ||
ccitt509-1.spdl | ||
ccitt509-1c.spdl | ||
ccitt509-3.spdl | ||
ccitt509-ban3.spdl | ||
denning-sacco-lowe.spdl | ||
denning-sacco.spdl | ||
kaochow-v2.spdl | ||
kaochow-v3.spdl | ||
kaochow.spdl | ||
ksl-lowe.spdl | ||
ksl.spdl | ||
needham-schroeder-lowe.spdl | ||
needham-schroeder-sk-amend.spdl | ||
needham-schroeder-sk.spdl | ||
needham-schroeder.spdl | ||
neumannstub-guttman-hwang.spdl | ||
neumannstub-guttman.spdl | ||
neumannstub-hwang.spdl | ||
neumannstub-keycompromise.spdl | ||
neumannstub.spdl | ||
NotModelled.txt | ||
otwayrees.spdl | ||
README.txt | ||
smartright.spdl | ||
splice-as-cj.spdl | ||
splice-as-hc.spdl | ||
splice-as.spdl | ||
tmn.spdl | ||
wmf-lowe.spdl | ||
wmf.spdl | ||
woo-lam-pi-1.spdl | ||
woo-lam-pi-2.spdl | ||
woo-lam-pi-3.spdl | ||
woo-lam-pi-f.spdl | ||
woo-lam-pi.spdl | ||
woo-lam.spdl | ||
yahalom-ban.spdl | ||
yahalom-lowe.spdl | ||
yahalom-paulson.spdl | ||
yahalom.spdl |
The protocols here are modeled according to their description in the SPORE library. In the 'key-compromise' directory one can find the same protocols, but modified to model the compromise of earlier sessions and the leakage of the corresponding local values.