Research Article
ESSM: Formal Analysis Framework for Protocol to Support Algebraic Operations and More Attack Capabilities
Table 9
Strands of KCI attack module.
| Rule name | Specification | Strand |
| Reveal | Get some key from encryption | | Reveal | Get some terms from encryption | | Reveal | Get some keys from hash | |
|
|