-
1
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
IEEE Comp. Soc. Press
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP decision procedure for protocol insecurity with XOR. In Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), pages 261-270. IEEE Comp. Soc. Press, 2003.
-
(2003)
Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03)
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
2
-
-
26444458330
-
Combining intruder theories
-
Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP '05), Springer
-
Y. Chevalier and M. Rusinowitch. Combining intruder theories. In Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP '05), volume 3580 of LNCS, pages 639-651. Springer, 2005.
-
(2005)
LNCS
, vol.3580
, pp. 639-651
-
-
Chevalier, Y.1
Rusinowitch, M.2
-
4
-
-
31744441853
-
A survey of algebraic properties used in cryptographic protocols
-
V. Cortier, S. Delaune, and P. Lafourcade. A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security, 14(1):1-43, 2006.
-
(2006)
Journal of Computer Security
, vol.14
, Issue.1
, pp. 1-43
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
5
-
-
84957375076
-
A secure and optimally efficient multiauthority election scheme
-
Proc. International Conference on the Theory and Application of Cryptographic Techniques
-
R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multiauthority election scheme. In Proc. International Conference on the Theory and Application of Cryptographic Techniques, volume 1233 of LNCS, pages 103-118, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
6
-
-
31344437591
-
Easy intruder deduction problems with homomorphisms
-
S. Delaune. Easy intruder deduction problems with homomorphisms. Information Processing Letters, 97(6):213-218, 2006.
-
(2006)
Information Processing Letters
, vol.97
, Issue.6
, pp. 213-218
-
-
Delaune, S.1
-
7
-
-
33746421112
-
An undecidability result for AGh
-
LSV, ENS Cachan, France
-
S. Delaune. An undecidability result for AGh. Research Report LSV-06-02, LSV, ENS Cachan, France, 2006.
-
(2006)
Research Report
, vol.LSV-06-02
-
-
Delaune, S.1
-
9
-
-
33746432242
-
Symbolic protocol analysis in presence of a homomorphism operator and exclusive or
-
Cachan
-
S. Delaune, P. Lafourcade, D. Lugiez, and R. Treinen. Symbolic protocol analysis in presence of a homomorphism operator and exclusive or. Research Report LSV-05-20, Cachan, 2005.
-
(2005)
Research Report
, vol.LSV-05-20
-
-
Delaune, S.1
Lafourcade, P.2
Lugiez, D.3
Treinen, R.4
-
12
-
-
0034634023
-
Complexity of nilpotent unification and matching problems
-
Q. Guo, P. Narendran, and D. A. Wolfram. Complexity of nilpotent unification and matching problems. Information and Computation, 162(1-2):3-23, 2000,
-
(2000)
Information and Computation
, vol.162
, Issue.1-2
, pp. 3-23
-
-
Guo, Q.1
Narendran, P.2
Wolfram, D.A.3
-
13
-
-
24944560619
-
Intruder deduction for AC-like equational theories with homomorphisms
-
Proc. of 16th Int. Conference on Rewriting Techniques and Applications (RTA '05), Springer
-
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder deduction for AC-like equational theories with homomorphisms. In Proc. of 16th Int. Conference on Rewriting Techniques and Applications (RTA '05), volume 3467 of LNCS, pages 308-322, Springer, 2005.
-
(2005)
LNCS
, vol.3467
, pp. 308-322
-
-
Lafourcade, P.1
Lugiez, D.2
Treinen, R.3
-
14
-
-
31344451177
-
Intruder deduction for the equational theory of exclusive-or with distributive encryption
-
ENS Cachan
-
P. Lafourcade, D, Lugiez, and R. Treinen. Intruder deduction for the equational theory of exclusive-or with distributive encryption. Research Report LSV-05-19, ENS Cachan, 2005.
-
(2005)
Research Report
, vol.LSV-05-19
-
-
Lafourcade, P.1
Lugiez, D.2
Treinen, R.3
-
16
-
-
24144477933
-
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation
-
J. Millen and V. Shmatikov. Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security, 13(3):515-564, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 515-564
-
-
Millen, J.1
Shmatikov, V.2
-
17
-
-
0037453396
-
Protocol insecurity with a finite number of sessions, composed keys is NP-complete
-
M. Rusinowitch and M. Turuani. Protocol insecurity with a finite number of sessions, composed keys is NP-complete. Theoretical Computer Science, 1-3(299):451-475, 2003.
-
(2003)
Theoretical Computer Science
, vol.1-3
, Issue.299
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
|