src/HOL/Auth/NS_Public.thy
2015-12-10 wenzelm 2015-12-10 isabelle update_cartouches -c -t;
2014-11-02 wenzelm 2014-11-02 modernized header uniformly as section;
2014-04-24 haftmann 2014-04-24 avoid non-standard simp default rule
2010-07-22 wenzelm 2010-07-22 updated some headers;
2009-10-17 wenzelm 2009-10-17 eliminated hard tabulators, guessing at each author's individual tab-width; tuned headers;
2007-07-11 berghofe 2007-07-11 Adapted to new inductive definition package.
2005-06-17 haftmann 2005-06-17 migrated theory headers to new format
2003-09-26 paulson 2003-09-26 Conversion of all main protocols from "Shared" to "Public". Removal of Key_supply_ax: modifications to possibility theorems. Improved presentation.
2003-09-23 paulson 2003-09-23 Removal of the Key_supply axiom (affects many possbility proofs) and minor changes
2003-05-05 paulson 2003-05-05 improved presentation of HOL/Auth theories
2003-04-26 paulson 2003-04-26 converting more HOL-Auth to new-style theories
2003-04-25 paulson 2003-04-25 Changes required by the certified email protocol Public-key model now provides separate signature/encryption keys and also long-term symmetric keys.
2002-08-17 paulson 2002-08-17 tidying of Isar scripts
2001-06-09 paulson 2001-06-09 renaming of evs in the Fake rule
2001-03-29 paulson 2001-03-29 misc tidying; changing the predicate isSymKey to the set symKeys
2001-02-13 paulson 2001-02-13 partial conversion to Isar script style simplified unicity proofs
1998-09-08 paulson 1998-09-08 Got rid of not_Says_to_self and most uses of ~= in definitions and theorems
1997-09-18 paulson 1997-09-18 Global change: lost->bad and sees Spy->spies First change just gives a more sensible name. Second change eliminates the agent parameter of "sees" to simplify definitions and theorems
1997-09-05 paulson 1997-09-05 Renamed "evs" to "evs1", "evs2", etc. in protocol inductive definition
1997-07-22 paulson 1997-07-22 Deleted the superfluous assumption A ~= B, which must hold anyway by induction
1997-07-14 paulson 1997-07-14 Changing "lost" from a parameter of protocol definitions to a constant. Advantages: no "lost" argument everywhere; fewer Vars in subgoals; less need for specially instantiated rules Disadvantage: can no longer prove "Agent_not_see_encrypted_key", but this theorem was never used, and its original proof was also broken the introduction of the "Notes" constructor.
1997-06-27 paulson 1997-06-27 Corrected indentations and margins after the renaming of "set_of_list"
1997-06-26 nipkow 1997-06-26 set_of_list -> set
1997-01-23 paulson 1997-01-23 Cosmetic improvements
1997-01-23 paulson 1997-01-23 Mended spelling error
1997-01-17 paulson 1997-01-17 Now with Andy Gordon's treatment of freshness to replace newN/K
1997-01-09 paulson 1997-01-09 New treatment of nonce creation
1996-12-19 paulson 1996-12-19 Extensive tidying and simplification, largely stemming from changing newN and newK to take an integer argument
1996-12-05 paulson 1996-12-05 Public-key examples