메뉴 건너뛰기




Volumn 4052 LNCS, Issue , 2006, Pages 132-143

Symbolic protocol analysis in presence of a homomorphism operator and exclusive or

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT THEORY; CRYPTOGRAPHY; POLYNOMIALS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33746409663     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11787006_12     Document Type: Conference Paper
Times cited : (10)

References (17)
  • 2
    • 26444458330 scopus 로고    scopus 로고
    • Combining intruder theories
    • Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP '05), Springer
    • Y. Chevalier and M. Rusinowitch. Combining intruder theories. In Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP '05), volume 3580 of LNCS, pages 639-651. Springer, 2005.
    • (2005) LNCS , vol.3580 , pp. 639-651
    • Chevalier, Y.1    Rusinowitch, M.2
  • 4
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • V. Cortier, S. Delaune, and P. Lafourcade. A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security, 14(1):1-43, 2006.
    • (2006) Journal of Computer Security , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 5
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multiauthority election scheme
    • Proc. International Conference on the Theory and Application of Cryptographic Techniques
    • R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multiauthority election scheme. In Proc. International Conference on the Theory and Application of Cryptographic Techniques, volume 1233 of LNCS, pages 103-118, 1997.
    • (1997) LNCS , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 6
    • 31344437591 scopus 로고    scopus 로고
    • Easy intruder deduction problems with homomorphisms
    • S. Delaune. Easy intruder deduction problems with homomorphisms. Information Processing Letters, 97(6):213-218, 2006.
    • (2006) Information Processing Letters , vol.97 , Issue.6 , pp. 213-218
    • Delaune, S.1
  • 7
    • 33746421112 scopus 로고    scopus 로고
    • An undecidability result for AGh
    • LSV, ENS Cachan, France
    • S. Delaune. An undecidability result for AGh. Research Report LSV-06-02, LSV, ENS Cachan, France, 2006.
    • (2006) Research Report , vol.LSV-06-02
    • Delaune, S.1
  • 9
    • 33746432242 scopus 로고    scopus 로고
    • Symbolic protocol analysis in presence of a homomorphism operator and exclusive or
    • Cachan
    • S. Delaune, P. Lafourcade, D. Lugiez, and R. Treinen. Symbolic protocol analysis in presence of a homomorphism operator and exclusive or. Research Report LSV-05-20, Cachan, 2005.
    • (2005) Research Report , vol.LSV-05-20
    • Delaune, S.1    Lafourcade, P.2    Lugiez, D.3    Treinen, R.4
  • 12
    • 0034634023 scopus 로고    scopus 로고
    • Complexity of nilpotent unification and matching problems
    • Q. Guo, P. Narendran, and D. A. Wolfram. Complexity of nilpotent unification and matching problems. Information and Computation, 162(1-2):3-23, 2000,
    • (2000) Information and Computation , vol.162 , Issue.1-2 , pp. 3-23
    • Guo, Q.1    Narendran, P.2    Wolfram, D.A.3
  • 13
    • 24944560619 scopus 로고    scopus 로고
    • Intruder deduction for AC-like equational theories with homomorphisms
    • Proc. of 16th Int. Conference on Rewriting Techniques and Applications (RTA '05), Springer
    • P. Lafourcade, D. Lugiez, and R. Treinen. Intruder deduction for AC-like equational theories with homomorphisms. In Proc. of 16th Int. Conference on Rewriting Techniques and Applications (RTA '05), volume 3467 of LNCS, pages 308-322, Springer, 2005.
    • (2005) LNCS , vol.3467 , pp. 308-322
    • Lafourcade, P.1    Lugiez, D.2    Treinen, R.3
  • 14
    • 31344451177 scopus 로고    scopus 로고
    • Intruder deduction for the equational theory of exclusive-or with distributive encryption
    • ENS Cachan
    • P. Lafourcade, D, Lugiez, and R. Treinen. Intruder deduction for the equational theory of exclusive-or with distributive encryption. Research Report LSV-05-19, ENS Cachan, 2005.
    • (2005) Research Report , vol.LSV-05-19
    • Lafourcade, P.1    Lugiez, D.2    Treinen, R.3
  • 16
    • 24144477933 scopus 로고    scopus 로고
    • Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation
    • J. Millen and V. Shmatikov. Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security, 13(3):515-564, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.3 , pp. 515-564
    • Millen, J.1    Shmatikov, V.2
  • 17
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with a finite number of sessions, composed keys is NP-complete
    • M. Rusinowitch and M. Turuani. Protocol insecurity with a finite number of sessions, composed keys is NP-complete. Theoretical Computer Science, 1-3(299):451-475, 2003.
    • (2003) Theoretical Computer Science , vol.1-3 , Issue.299 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.