메뉴 건너뛰기




Volumn 338, Issue 1-3, 2005, Pages 247-274

An NP decision procedure for protocol insecurity with XOR

Author keywords

Complexity; Protocols; Security; Verification; XOR

Indexed keywords

ALGEBRA; BOUNDARY CONDITIONS; COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; DECISION MAKING; PROBLEM SOLVING; TEXT PROCESSING;

EID: 18544380224     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2005.01.015     Document Type: Article
Times cited : (29)

References (30)
  • 1
    • 84874678490 scopus 로고    scopus 로고
    • On name generation and set-based analysis in the Dolev-Yao Model
    • L. Brim, P. Jancar, M. Kretinsky, A. Kucera (Eds.), 13th Internat. Conf. on Concurrency Theory (CONCUR 2002) Springer, Berlin
    • R.M. Amadio, W. Charatonik, On name generation and set-based analysis in the Dolev-Yao Model, in: L. Brim, P. Jancar, M. Kretinsky, A. Kucera (Eds.), 13th Internat. Conf. on Concurrency Theory (CONCUR 2002), Lecture Notes in Computer Science, Vol. 2421, Springer, Berlin, 2002, pp. 499-514.
    • (2002) Lecture Notes in Computer Science , vol.2421 , pp. 499-514
    • Amadio, R.M.1    Charatonik, W.2
  • 2
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • C. Palamidessi (Ed.) 11th Internat. Conf., Lecture Notes in Computer Science Springer, Berlin
    • R. Amadio, D. Lugiez, On the reachability problem in cryptographic protocols, in: C. Palamidessi (Ed.), Proc. CONCUR 2000 - Concurrency Theory, 11th Internat. Conf., Lecture Notes in Computer Science, Vol. 1877, Springer, Berlin, 2000, pp. 380-394.
    • (2000) Proc. CONCUR 2000 - Concurrency Theory , vol.1877 , pp. 380-394
    • Amadio, R.1    Lugiez, D.2
  • 3
    • 35248876774 scopus 로고    scopus 로고
    • SAT-based model-checking of security protocols using planning graph analysis
    • Lecture Notes in Computer Science Springer, Berlin
    • A. Armando, L. Compagna, P. Ganty, SAT-based model-checking of security protocols using planning graph analysis, in: Proc. 12th Internat. FME Symp. (FME 2003), Lecture Notes in Computer Science, Vol. 2885, Springer, Berlin, 2003, pp. 875-893.
    • (2003) Proc. 12th Internat. FME Symp. (FME 2003) , vol.2885 , pp. 875-893
    • Armando, A.1    Compagna, L.2    Ganty, P.3
  • 4
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • E. Snekkenes, D. Gollmann (Eds.) Lecture Notes in Computer Science Springer, Berlin
    • D. Basin, S. Mödersheim, L. Viganò, An on-the-fly model-checker for security protocol analysis, in: E. Snekkenes, D. Gollmann (Eds.), Proc. Eighth European Symp. on Research in Computer Security (ESORICS 2003), Lecture Notes in Computer Science, Vol. 2808, Springer, Berlin, 2003, pp. 253-270.
    • (2003) Proc. Eighth European Symp. on Research in Computer Security (ESORICS 2003) , vol.2808 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 5
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • Automata, Languages and Programming, 28th Internat. Colloq. (ICALP 2001) Springer, Berlin
    • M. Boreale, Symbolic trace analysis of cryptographic protocols, in: Automata, Languages and Programming, 28th Internat. Colloq. (ICALP 2001), Lecture Notes in Computer Science, Vol. 2076, Springer, Berlin, 2001, pp. 667-681.
    • (2001) Lecture Notes in Computer Science , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 6
    • 0041967380 scopus 로고    scopus 로고
    • An NP decision procedure for protocol insecurity with XOR
    • Lecture Notes in Computer Science 2003, IEEE, Computer Society Press
    • Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, An NP decision procedure for protocol insecurity with XOR, in: Proc. 18th Ann. IEEE Symp. on Logic in Computer Science, Lecture Notes in Computer Science 2003, IEEE, Computer Society Press, 2003, pp. 261-270.
    • (2003) Proc. 18th Ann. IEEE Symp. on Logic in Computer Science , pp. 261-270
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 7
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    • P.K. Pandya, J. Radhakrishnan (Eds.), FSTTCS 2003: Foundations of Software Technology and Theoretical Computer Science Springer, Berlin
    • Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, in: P.K. Pandya, J. Radhakrishnan (Eds.), FSTTCS 2003: Foundations of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, Vol. 2914, Springer, Berlin, 2003, pp. 124-135.
    • (2003) Lecture Notes in Computer Science , vol.2914 , pp. 124-135
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 9
    • 84937559950 scopus 로고    scopus 로고
    • Automated unbounded verification of security protocols
    • Lecture Notes in Computer Science Springer, Berlin
    • Y. Chevalier, L. Vigneron, Automated unbounded verification of security protocols, in: Proc. 14th Internat. Conf. on Computer Aided Verification (CAV 2002), Lecture Notes in Computer Science, Vol. 2404, Springer, Berlin, 2002, pp. 324-337.
    • (2002) Proc. 14th Internat. Conf. on Computer Aided Verification (CAV 2002) , vol.2404 , pp. 324-337
    • Chevalier, Y.1    Vigneron, L.2
  • 11
    • 35248897454 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints, and ping-pong protocols
    • Automata, Languages and Programming, 28th Internat. Colloq. (ICALP 2001)
    • H. Comon, V. Cortier, J. Mitchell, Tree automata with one memory, set constraints, and ping-pong protocols, in: Automata, Languages and Programming, 28th Internat. Colloq. (ICALP 2001), Lecture Notes in Computer Science, Vol. 2076, 2001, pp. 682-693.
    • (2001) Lecture Notes in Computer Science , vol.2076 , pp. 682-693
    • Comon, H.1    Cortier, V.2    Mitchell, J.3
  • 12
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • Lecture Notes in Computer Science 2003, IEEE, Computer Society Press
    • H. Comon-Lundh, V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, in: Proc. 18th Ann. IEEE Symp. on Logic in Computer Science, Lecture Notes in Computer Science 2003, IEEE, Computer Society Press, 2003, pp. 271-280.
    • (2003) Proc. 18th Ann. IEEE Symp. on Logic in Computer Science , pp. 271-280
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 13
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • D. Dolev, and A.C. Yao On the security of public-key protocols IEEE Trans. Inform. Theory 29 2 1983 198 208
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 15
    • 0034829105 scopus 로고    scopus 로고
    • Computing symbolic models for verifying cryptographic protocols
    • IEEE, Computer Society Press
    • M.P. Fiore, and M. Abadi Computing symbolic models for verifying cryptographic protocols 14th Computer Security Foundations Workshop (CSFW-14) 2001 IEEE, Computer Society Press 160 173
    • (2001) 14th Computer Security Foundations Workshop (CSFW-14) , pp. 160-173
    • Fiore, M.P.1    Abadi, M.2
  • 16
    • 51149098006 scopus 로고    scopus 로고
    • An E-unification algorithm for analysing protocols that use modular exponentiation
    • R. Nieuwenhuis (Ed.) Lecture Notes in Computer Science Springer
    • D. Kapur, P. Narendran, L. Wang, An E-unification Algorithm for Analysing Protocols that Use Modular Exponentiation, in: R. Nieuwenhuis (Ed.), Proc. 14th Internat. Conf. on Rewriting Techniques and Applications (RTA 2003), Lecture Notes in Computer Science, Vol. 2706, Springer, 2003, pp. 165-179.
    • (2003) Proc. 14th Internat. Conf. on Rewriting Techniques and Applications (RTA 2003) , vol.2706 , pp. 165-179
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 17
    • 84874721799 scopus 로고    scopus 로고
    • On the decidability of cryptographic protocols with open-ended data structures
    • L. Brim, P. Jancar, M. Kretinsky, A. Kucera (Eds.), 13th Internat. Conf. on Concurrency Theory (CONCUR 2002) Springer, Berlin
    • R. Küsters, On the decidability of cryptographic protocols with open-ended data structures, in: L. Brim, P. Jancar, M. Kretinsky, A. Kucera (Eds.), 13th Internat. Conf. on Concurrency Theory (CONCUR 2002), Lecture Notes in Computer Science, Vol. 2421, Springer, Berlin, 2002, pp. 515-530.
    • (2002) Lecture Notes in Computer Science , vol.2421 , pp. 515-530
    • Küsters, R.1
  • 18
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • G. Lowe An attack on the Needham-Schroeder public-key authentication protocol Inform. Process. Lett. 56 1995 131 133
    • (1995) Inform. Process. Lett. , vol.56 , pp. 131-133
    • Lowe, G.1
  • 19
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems (TACAS 1996) Springer, Berlin
    • G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Tools and Algorithms for the Construction and Analysis of Systems (TACAS 1996), Lecture Notes in Computer Science, Vol. 1055, Springer, Berlin, 1996, pp. 147-166.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 20
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • G. Lowe Towards a completeness result for model checking of security protocols J. Comput. Security 7 2-3 1999 89 146
    • (1999) J. Comput. Security , vol.7 , Issue.2-3 , pp. 89-146
    • Lowe, G.1
  • 24
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham, and M. Schroeder Using encryption for authentication in large networks of computers Commun. ACM 21 12 1978 993 999
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 28
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol
    • P.Y.A. Ryan, and S.A. Schneider An attack on a recursive authentication protocol Inform. Process. Lett. 65 1 1998 7 10
    • (1998) Inform. Process. Lett. , vol.65 , Issue.1 , pp. 7-10
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 29
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D.X. Song, S. Berezin, and A. Perrig Athena a novel approach to efficient automatic security protocol analysis J. Comput. Security 9 1/2 2001 47 74
    • (2001) J. Comput. Security , vol.9 , Issue.12 , pp. 47-74
    • Song, D.X.1    Berezin, S.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.