메뉴 건너뛰기




Volumn 3467, Issue , 2005, Pages 308-322

Intruder deduction for AC-like equational theories with homomorphisms

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATA THEORY; CONCURRENCY CONTROL; CRYPTOGRAPHY; DECISION THEORY; PROBLEM SOLVING;

EID: 24944560619     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-32033-3_23     Document Type: Conference Paper
Times cited : (34)

References (19)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Jan.
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1): 1-70, Jan. 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 2
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Proc. 1st IFIP International Conference on Theoretical Computer Science (IFIP-TCS). Springer-Verlag
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Proc. 1st IFIP International Conference on Theoretical Computer Science (IFIP-TCS), volume 1872 of LNCS, pages 3-22. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 6
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • Ottawa (Canada). IEEE Comp. Soc. Press
    • H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), pages 271-280, Ottawa (Canada), 2003. IEEE Comp. Soc. Press.
    • (2003) Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03) , pp. 271-280
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 7
    • 35248836596 scopus 로고    scopus 로고
    • Easy intruder deductions
    • N. Dershowitz, editor, Verification: Theory & Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday. Springer-Verlag
    • H. Comon-Lundh and R. Treinen. Easy intruder deductions. In N. Dershowitz, editor, Verification: Theory & Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday, volume 2772 of LNCS, pages 225-242. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2772 , pp. 225-242
    • Comon-Lundh, H.1    Treinen, R.2
  • 8
    • 24944558206 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • LSV, ENS de Cachan, Sept.
    • V. Cortier, S. Delaune, and P. Lafourcade. A survey of algebraic properties used in cryptographic protocols. Research Report LSV-04-15, LSV, ENS de Cachan, Sept. 2004. Available at http://www.lsv.ens-cachan.fr/Publis/ RAPPORTS_LSV/rapports-year-2004-list.php.
    • (2004) Research Report , vol.LSV-04-15
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 9
    • 0000029077 scopus 로고
    • Rewrite systems
    • J. van Leeuwen, editor Formal Models and Semantics, chapter 6. Elsevier Science Publishers and The MIT Press
    • N. Dershowitz and J.-P. Jouannaud. Rewrite systems. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B - Formal Models and Semantics, chapter 6, pages 243-320. Elsevier Science Publishers and The MIT Press, 1990.
    • (1990) Handbook of Theoretical Computer Science , vol.B , pp. 243-320
    • Dershowitz, N.1    Jouannaud, J.-P.2
  • 10
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • IEEE Comp. Soc. Press
    • D. Dolev and A. Yao. On the security of public-key protocols. In Transactions on Information Theory, volume 29, pages 198-208. IEEE Comp. Soc. Press, 1983.
    • (1983) Transactions on Information Theory , vol.29 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 13
    • 72649084870 scopus 로고    scopus 로고
    • Intruder deduction for ac-like equational theories with homomorphisms
    • LSV, ENS de Cachan, Nov.
    • P. Lafourcade, D. Lugiez, and R. Treinen. Intruder deduction for ac-like equational theories with homomorphisms. Research Report LSV-04-16, LSV, ENS de Cachan, Nov. 2004. Available at http://www.lsv.ens-cachan.fr/Publis/ RAPPORTS_LSV/rapports-year-2004-list.php.
    • (2004) Research Report , vol.LSV-04-16
    • Lafourcade, P.1    Lugiez, D.2    Treinen, R.3
  • 14
    • 28144456308 scopus 로고
    • An attack on the Needham-schroeder public key authentication protocol
    • G. Lowe. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters, 56(3): 131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 15
    • 0027578148 scopus 로고
    • Automatic recognition of tractability in inference relations
    • April
    • D. A. McAllester. Automatic recognition of tractability in inference relations. JACM, 40(2):284-303, April 1993.
    • (1993) JACM , vol.40 , Issue.2 , pp. 284-303
    • McAllester, D.A.1
  • 19
    • 24944516385 scopus 로고    scopus 로고
    • Personal communication
    • M. Turuani. Personal communication, 2003.
    • (2003)
    • Turuani, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.