Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM
Crossref DOI link: https://doi.org/10.1038/s41598-025-93373-y
Published Online: 2025-04-07
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Li, Qiang
Han, Jihong
Yuan, Lin
Li, Xiangcheng
Wang, Xiaoyu
Text and Data Mining valid from 2025-04-07
Version of Record valid from 2025-04-07
Article History
Received: 16 December 2024
Accepted: 6 March 2025
First Online: 7 April 2025
Declarations
:
: The authors declare no competing interests.