-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Jan.
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1): 1-70, Jan. 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
84879078812
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Proc. 1st IFIP International Conference on Theoretical Computer Science (IFIP-TCS). Springer-Verlag
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Proc. 1st IFIP International Conference on Theoretical Computer Science (IFIP-TCS), volume 1872 of LNCS, pages 3-22. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
Ottawa (Canada). IEEE Comp. Soc. Press
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP decision procedure for protocol insecurity with XOR. In Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), pages 261-270, Ottawa (Canada), 2003. IEEE Comp. Soc. Press.
-
(2003)
Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03)
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
6
-
-
0042467908
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
Ottawa (Canada). IEEE Comp. Soc. Press
-
H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), pages 271-280, Ottawa (Canada), 2003. IEEE Comp. Soc. Press.
-
(2003)
Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03)
, pp. 271-280
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
7
-
-
35248836596
-
Easy intruder deductions
-
N. Dershowitz, editor, Verification: Theory & Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday. Springer-Verlag
-
H. Comon-Lundh and R. Treinen. Easy intruder deductions. In N. Dershowitz, editor, Verification: Theory & Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday, volume 2772 of LNCS, pages 225-242. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2772
, pp. 225-242
-
-
Comon-Lundh, H.1
Treinen, R.2
-
8
-
-
24944558206
-
A survey of algebraic properties used in cryptographic protocols
-
LSV, ENS de Cachan, Sept.
-
V. Cortier, S. Delaune, and P. Lafourcade. A survey of algebraic properties used in cryptographic protocols. Research Report LSV-04-15, LSV, ENS de Cachan, Sept. 2004. Available at http://www.lsv.ens-cachan.fr/Publis/ RAPPORTS_LSV/rapports-year-2004-list.php.
-
(2004)
Research Report
, vol.LSV-04-15
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
9
-
-
0000029077
-
Rewrite systems
-
J. van Leeuwen, editor Formal Models and Semantics, chapter 6. Elsevier Science Publishers and The MIT Press
-
N. Dershowitz and J.-P. Jouannaud. Rewrite systems. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B - Formal Models and Semantics, chapter 6, pages 243-320. Elsevier Science Publishers and The MIT Press, 1990.
-
(1990)
Handbook of Theoretical Computer Science
, vol.B
, pp. 243-320
-
-
Dershowitz, N.1
Jouannaud, J.-P.2
-
10
-
-
0020720357
-
On the security of public-key protocols
-
IEEE Comp. Soc. Press
-
D. Dolev and A. Yao. On the security of public-key protocols. In Transactions on Information Theory, volume 29, pages 198-208. IEEE Comp. Soc. Press, 1983.
-
(1983)
Transactions on Information Theory
, vol.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
12
-
-
0000249040
-
Fast parallel computation of hermite and smith forms of polynomial matrices
-
E. Kaltofen, M. S. Krishnamoorthy, and B. D. Saunders. Fast parallel computation of hermite and smith forms of polynomial matrices. SIAM J. Algebraic Discrete Methods, 8(4):683-690, 1987.
-
(1987)
SIAM J. Algebraic Discrete Methods
, vol.8
, Issue.4
, pp. 683-690
-
-
Kaltofen, E.1
Krishnamoorthy, M.S.2
Saunders, B.D.3
-
13
-
-
72649084870
-
Intruder deduction for ac-like equational theories with homomorphisms
-
LSV, ENS de Cachan, Nov.
-
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder deduction for ac-like equational theories with homomorphisms. Research Report LSV-04-16, LSV, ENS de Cachan, Nov. 2004. Available at http://www.lsv.ens-cachan.fr/Publis/ RAPPORTS_LSV/rapports-year-2004-list.php.
-
(2004)
Research Report
, vol.LSV-04-16
-
-
Lafourcade, P.1
Lugiez, D.2
Treinen, R.3
-
14
-
-
28144456308
-
An attack on the Needham-schroeder public key authentication protocol
-
G. Lowe. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters, 56(3): 131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
15
-
-
0027578148
-
Automatic recognition of tractability in inference relations
-
April
-
D. A. McAllester. Automatic recognition of tractability in inference relations. JACM, 40(2):284-303, April 1993.
-
(1993)
JACM
, vol.40
, Issue.2
, pp. 284-303
-
-
McAllester, D.A.1
-
19
-
-
24944516385
-
-
Personal communication
-
M. Turuani. Personal communication, 2003.
-
(2003)
-
-
Turuani, M.1
|