Research Article
ESSM: Formal Analysis Framework for Protocol to Support Algebraic Operations and More Attack Capabilities
Table 8
Strands of Lim-Lee attack module.
| | Rule name | Specification | Strand |
| | LL-G | Generating elements outside the group | | | LL-V | Guess the elements of validation | | | LL-C | Computing term using CRT | |
|
|