Files
scyther/gui/Protocols
2010-12-12 22:13:18 +01:00
..

The protocols here are modeled according to their description in the
SPORE library.

In the 'key-compromise' directory one can find the same protocols, but
modified to model the compromise of earlier sessions and the leakage of
the corresponding local values.