메뉴 건너뛰기




Volumn 13, Issue 3, 2005, Pages 515-564

Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; PROBLEM SOLVING;

EID: 24144477933     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2005-13306     Document Type: Conference Paper
Times cited : (23)

References (34)
  • 1
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Proc. 11th International Conference on Concurrency Theory (CONCUR '00), Springer-Verlag
    • R. Amadio and D. Lugiez, On the reachability problem in cryptographic protocols, in: Proc. 11th International Conference on Concurrency Theory (CONCUR '00), Volume 1877 of LNC5, Springer-Verlag, 2000, pp. 380-394.
    • (2000) LNC5 , vol.1877 , pp. 380-394
    • Amadio, R.1    Lugiez, D.2
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography
    • M. Abadi and P. Rogaway, Reconciling two views of cryptography, J. Cryptology 15(2) (2002), 103-127.
    • (2002) J. Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 33645585862 scopus 로고    scopus 로고
    • On the symbolic analysis of low-level cryptographic primitives: Modular exponentiation and the Diffie-Hellman protocol
    • M. Boreale and M. Buscemi, On the symbolic analysis of low-level cryptographic primitives: modular exponentiation and the Diffie-Hellman protocol, in: Proc. Workshop on the Foundations of Computer Security (FCS), 2003.
    • (2003) Proc. Workshop on the Foundations of Computer Security (FCS)
    • Boreale, M.1    Buscemi, M.2
  • 4
    • 33645604225 scopus 로고    scopus 로고
    • Introducing commutative and associative operators in cryptographic protocol analysis
    • Proc. 23rd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE '03), Springer-Verlag
    • I.C. Bertolotti, L. Durante, R. Sisto and A. Valenzano, Introducing commutative and associative operators in cryptographic protocol analysis, in: Proc. 23rd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE '03), Volume 2767 of LNCS, Springer-Verlag, 2003, pp. 224-239.
    • (2003) LNCS , vol.2767 , pp. 224-239
    • Bertolotti, I.C.1    Durante, L.2    Sisto, R.3    Valenzano, A.4
  • 6
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • Proc. 28th International Colloquium on Automata, Languages and Programing (ICALP '01), Springer-Verlag
    • M. Boreale, Symbolic trace analysis of cryptographic protocols, in: Proc. 28th International Colloquium on Automata, Languages and Programing (ICALP '01), Volume 2076 of LNCS, Springer-Verlag, 2001, pp. 667-681.
    • (2001) LNCS , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 7
    • 0346205107 scopus 로고    scopus 로고
    • Unification theory
    • A. Robinson and A. Voronkov, eds, Chapter 8, Elsevier Science
    • F. Baader and W. Snyder, Unification theory, in: Handbook of Automated Reasoning, A. Robinson and A. Voronkov, eds, Volume 1, Chapter 8, Elsevier Science, 2001, pp. 445-532.
    • (2001) Handbook of Automated Reasoning , vol.1 , pp. 445-532
    • Baader, F.1    Snyder, W.2
  • 8
    • 35248897454 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints, and ping-pong protocols
    • Proc. 28th International Colloquium on Automata, Languages and Programming (ICALP '01), Springer-Verlag
    • H. Comon, V. Cortier and J.C. Mitchell, Tree automata with one memory, set constraints, and ping-pong protocols, in: Proc. 28th International Colloquium on Automata, Languages and Programming (ICALP '01), Volume 2076 of LNCS, Springer-Verlag, 2001, pp. 682-693.
    • (2001) LNCS , vol.2076 , pp. 682-693
    • Comon, H.1    Cortier, V.2    Mitchell, J.C.3
  • 9
    • 0001113391 scopus 로고
    • An efficient algorithm for solving systems of Diophantine equations
    • E. Contejean and H. Devie, An efficient algorithm for solving systems of Diophantine equations, Information and Computation 113(1) (1994), 143-172.
    • (1994) Information and Computation , vol.113 , Issue.1 , pp. 143-172
    • Contejean, E.1    Devie, H.2
  • 10
    • 84958742278 scopus 로고    scopus 로고
    • An improved constraint-based system for the verification of security protocols
    • Proc. 9th International Static Analysis Symposium (SAS '02), Springer-Verlag
    • R. Corin and S. Etalle, An improved constraint-based system for the verification of security protocols, in: Proc. 9th International Static Analysis Symposium (SAS '02), Volume 2477 of LNCS, Springer-Verlag, 2002, pp. 326-341.
    • (2002) LNCS , vol.2477 , pp. 326-341
    • Corin, R.1    Etalle, S.2
  • 12
    • 33645587296 scopus 로고    scopus 로고
    • Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    • CAU Kiel
    • Y. Chevalier, R. Küters, M. Rusinowitch and M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, Technical Report IFI-Report 0305, CAU Kiel, 2003.
    • (2003) Technical Report IFI-Report , vol.305
    • Chevalier, Y.1    Küters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 18
    • 33645604729 scopus 로고    scopus 로고
    • A unification algorithm for analysis of protocols with blinded signatures
    • SUNY Albany
    • D. Kapur, P. Narendran and L. Wang, A unification algorithm for analysis of protocols with blinded signatures, Technical Report 02-5, SUNY Albany, 2002.
    • (2002) Technical Report , vol.2 , Issue.5
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 19
    • 51149098006 scopus 로고    scopus 로고
    • An e-unification algorithm for analyzing protocols that use modular exponentiation
    • Proc. 14th International Conference on Rewriting Techniques and Applications (RTA '03), Springer-Verlag
    • D. Kapur, P. Narendran and L. Wang, An e-unification algorithm for analyzing protocols that use modular exponentiation, in: Proc. 14th International Conference on Rewriting Techniques and Applications (RTA '03), Volume 2706 of LNCS, Springer-Verlag, 2003, pp. 165-179.
    • (2003) LNCS , vol.2706 , pp. 165-179
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 20
    • 0017996760 scopus 로고
    • Time, clocks and the ordering of events in a distributed system
    • L. Lamport, Time, clocks and the ordering of events in a distributed system, Comms. ACM 21(7) (1978), 558-565.
    • (1978) Comms. ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 21
    • 85006279726 scopus 로고
    • Adventures in associative-communtative unification
    • P. Lincoln and J. Christian, Adventures in associative-communtative unification, J. Symb. Comput. 8(1-2) (1989), 217-240.
    • (1989) J. Symb. Comput. , vol.8 , Issue.1-2 , pp. 217-240
    • Lincoln, P.1    Christian, J.2
  • 22
    • 0037611038 scopus 로고    scopus 로고
    • On the freedom of decryption
    • J. Millen, On the freedom of decryption, Information Processing Letters 86(6) (2003), 329-333.
    • (2003) Information Processing Letters , vol.86 , Issue.6 , pp. 329-333
    • Millen, J.1
  • 26
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson, The inductive approach to verifying cryptographic protocols, J. Computer Security 6(1/2) (1998), 85-128.
    • (1998) J. Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.1
  • 28
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol: A cautionary tale
    • P. Ryan and S. Schneider, An attack on a recursive authentication protocol: A cautionary tale, Information Processing Letters 65(1) (1998), 7-10.
    • (1998) Information Processing Letters , vol.65 , Issue.1 , pp. 7-10
    • Ryan, P.1    Schneider, S.2
  • 30
    • 35048827395 scopus 로고    scopus 로고
    • Decidable analysis of cryptographic protocols with products and modular exponentiation
    • Proc. 13th European Symposium on Programming (ESOP '04), Springer-Verlag
    • V. Shmatikov, Decidable analysis of cryptographic protocols with products and modular exponentiation, in: Proc. 13th European Symposium on Programming (ESOP '04), Volume 2986 of LNCS, Springer-Verlag, 2004, pp. 355-369.
    • (2004) LNCS , vol.2986 , pp. 355-369
    • Shmatikov, V.1
  • 31
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • D. Song, Athena: a new efficient automatic checker for security protocol analysis, in: Proc. 12th IEEE Computer Security Foundations Workshop, 1999, pp. 192-202.
    • (1999) Proc. 12th IEEE Computer Security Foundations Workshop , pp. 192-202
    • Song, D.1
  • 32
    • 84937708748 scopus 로고
    • Unification in a combination of arbitrary disjoint equational theories
    • M. Schmidt-Schauss, Unification in a combination of arbitrary disjoint equational theories, J. Symbolic Computation 8 (1989), 51-99.
    • (1989) J. Symbolic Computation , vol.8 , pp. 51-99
    • Schmidt-Schauss, M.1
  • 34
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct?
    • F. Thayer, J. Herzog and J. Guttman, Strand spaces: proving security protocols correct? J. Computer Security 7(1) (1999).
    • (1999) J. Computer Security , vol.7 , Issue.1
    • Thayer, F.1    Herzog, J.2    Guttman, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.