Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15
DOI: 10.1109/csfw.2002.1021810
|View full text |Cite
|
Sign up to set email alerts
|

Strand spaces and rank functions:more than distant cousins

Abstract: We show that for rigid symmetric top molecules in electric fields the phenomenon of monodromy arises naturally as a ''defect'' in the lattice of quantum states in the energy-momentum diagram. This makes it impossible to use either the total angular momentum or a pendular quantum number to label the states globally. The monodromy is created or destroyed by classical Hamiltonian Hopf bifurcations from relative equilibria. These phenomena are robust and should be observable in quasi-symmetric top molecules with f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…In this section we use the proof system developed in section 3 to prove a secrecy property of a simple variant N SLV AR of the Needham-Schroeder-Lowe protocol, proposed in [16], in which parties A and B use an authenticated temporary secret na to establish a secret key k that is in turn used to protect the actual message m. The main difference from the original NSL protocol is that the initiator's nonce is leaked in the final message. Reasoning from A's point of view, nonce na should be secret between A and B at the point of the run in the protocol where A is just about to send the last message.…”
Section: Analysis Of a Variant Of Nslmentioning
confidence: 99%
See 3 more Smart Citations
“…In this section we use the proof system developed in section 3 to prove a secrecy property of a simple variant N SLV AR of the Needham-Schroeder-Lowe protocol, proposed in [16], in which parties A and B use an authenticated temporary secret na to establish a secret key k that is in turn used to protect the actual message m. The main difference from the original NSL protocol is that the initiator's nonce is leaked in the final message. Reasoning from A's point of view, nonce na should be secret between A and B at the point of the run in the protocol where A is just about to send the last message.…”
Section: Analysis Of a Variant Of Nslmentioning
confidence: 99%
“…For example, within CSP, properties of messages that may appear on the network have been identified by defining a rank function [18,16], with an inductive proof used to show that rank is preserved by the attacker actions and all honest parties. In comparison, arguments in our formal logic use a conjunction involving the SafeNet predicate and protocol specific properties Φ in our inductive hypotheses.…”
Section: Analysis Of a Variant Of Nslmentioning
confidence: 99%
See 2 more Smart Citations
“…We also extend previous composition theorems [16,21] to the present setting, and illustrate the power of the resulting system by giving modular formal proofs of authentication and secrecy properties of Kerberos V5 and Kerberos V5 with PKINIT. We are also able to prove properties of a variant of the Needham-Schroeder-Lowe protocol that are beyond the standard rank function method [22,19].…”
Section: Introductionmentioning
confidence: 99%