메뉴 건너뛰기




Volumn 2706, Issue , 2003, Pages 165-179

An E-unification algorithm for analyzing protocols that use modular exponentiation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 51149098006     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44881-0_13     Document Type: Conference Paper
Times cited : (27)

References (20)
  • 3
    • 84968312063 scopus 로고
    • Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures
    • Saratoga Springs, NY, Springer LNAI
    • F. Baader and K.U. Schultz: Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures. Proc. 11th Conference on Automated Deduction (CADE-11), Saratoga Springs, NY, Springer LNAI 607, 1992, 50–65.
    • (1992) Proc. 11Th Conference on Automated Deduction (CADE-11) , vol.607 , pp. 50-65
    • Baader, F.1    Schultz, K.U.2
  • 4
    • 0003568551 scopus 로고    scopus 로고
    • Unpublished Technical Report, Department of Computer Science, University of York, UK, Nov
    • J. Clark and J. Jacob: A Survey of Authentication Protocol Literature: Version 1.0. Unpublished Technical Report, Department of Computer Science, University of York, UK, Nov 1997. Available at the URL: www-users.cs.york.ac.uk/˜jac/papers/drareviewps.ps.
    • (1997) A Survey of Authentication Protocol Literature: Version 1.0
    • Clark, J.1    Jacob, J.2
  • 6
    • 42449116060 scopus 로고
    • Computing the Gröbner Basis of a Polynomial Ideal over Integers
    • Schenectady, NY, July
    • A. Kandri-Rody and D. Kapur. Computing the Gröbner Basis of a Polynomial Ideal over Integers. Proc. Third MACSYMA Users’ Conference, Schenectady, NY, July 1984, 436–451.
    • (1984) Proc. Third MACSYMA Users’ Conference , pp. 436-451
    • Kandri-Rody, A.1    Kapur, D.2
  • 7
    • 0346280713 scopus 로고
    • An Algorithm for Computing the Gröbner Basis of a Polynomial Ideal over an Euclidean Ring
    • August
    • A. Kandri-Rody and D. Kapur. An Algorithm for Computing the Gröbner Basis of a Polynomial Ideal over an Euclidean Ring. Journal of Symbolic Computation, 6 (1), August 1988, 37-57.
    • (1988) Journal of Symbolic Computation , vol.6 , Issue.1 , pp. 37-57
    • Kandri-Rody, A.1    Kapur, D.2
  • 8
    • 84947713704 scopus 로고    scopus 로고
    • TR 02-5, Department of Computer Science, SUNY, Albany, NY. To appear in the Festschrift for Jörg Siekmann (Dieter Hutter, Werner Stephan, eds.), Lecture Notes in Artificial Intelligence, Springer
    • D. Kapur, P. Narendran, and L. Wang. A Unification Algorithm for Analysis of Protocols with Blinded Signatures. TR 02-5, Department of Computer Science, SUNY, Albany, NY. To appear in the Festschrift for Jörg Siekmann (Dieter Hutter, Werner Stephan, eds.), Lecture Notes in Artificial Intelligence 2605, Springer.
    • A Unification Algorithm for Analysis of Protocols with Blinded Signatures
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 11
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An Overview
    • C. Meadows. The NRL Protocol Analyzer: An Overview. J. Logic Programming, 26(2), 1996, 113–131.
    • (1996) J. Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 12
    • 84940106630 scopus 로고    scopus 로고
    • Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer
    • IEEE
    • C. Meadows. Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer. In: Proc. the 1999 Symp. on Security and Privacy, IEEE.
    • Proc. The 1999 Symp. On Security and Privacy
    • Meadows, C.1
  • 13
    • 84947746973 scopus 로고    scopus 로고
    • Formal Specification and Analysis of the Group Domain of Interpretation Protocol using NPATROL and the NRL Protocol Analyzer
    • To appear in the
    • C. Meadows, P. Syverson and I. Cervesato. Formal Specification and Analysis of the Group Domain of Interpretation Protocol using NPATROL and the NRL Protocol Analyzer. To appear in the Journal of Computer Security.
    • Journal of Computer Security
    • Meadows, C.1    Syverson, P.2    Cervesato, I.3
  • 16
    • 0031505860 scopus 로고    scopus 로고
    • On the Unification Problem for Cartesian Closed Categories
    • June 97
    • P. Narendran, F. Pfenning, and R. Statman. On the Unification Problem for Cartesian Closed Categories. Journal of Symbolic Logic, 62 (2), June 97, 636–647.
    • Journal of Symbolic Logic , vol.62 , Issue.2 , pp. 636-647
    • Narendran, P.1    Pfenning, F.2    Statman, R.3
  • 18
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. CACM 21 (2), 1978, 120–126.
    • (1978) CACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 19
    • 84974759626 scopus 로고
    • The Role of Trust in Information Integrity Protocols
    • G. Simmons and C. Meadows. The Role of Trust in Information Integrity Protocols. Journal of Computer Security 3(2), 1994.
    • (1994) Journal of Computer Security , vol.3 , Issue.2
    • Simmons, G.1    Meadows, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.