Abstract We present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which we consider authentication and key secrecy properties. Our proofs rely on the Dolev
Michael Backes, Iliano Cervesato, Aaron D. Jaggard