-
1
-
-
70349293409
-
-
CCA Basic Services Reference and Guide: CCA Basic Services Reference and Guide, 2003. Available at http: //www-306.ibm.com/security/cryptocards/pdfs/CCA- Basic-Services-241-Revised-20030918.pdf.
-
CCA Basic Services Reference and Guide: CCA Basic Services Reference and Guide, 2003. Available at http: //www-306.ibm.com/security/cryptocards/pdfs/CCA- Basic-Services-241-Revised-20030918.pdf.
-
-
-
-
2
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
IEEE Comp. Soc. Press
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In Proc. of CSFW-14, pages 82-96. IEEE Comp. Soc. Press, 2001.
-
(2001)
Proc. of CSFW-14
, pp. 82-96
-
-
Blanchet, B.1
-
3
-
-
70349294955
-
-
Bruno Blanchet. Automatic verification of correspondences for security protocols, 2008. Report arXiv:0802.3444vl. Available at http://arxiv.org/abs/ 0802.3444vl.
-
Bruno Blanchet. Automatic verification of correspondences for security protocols, 2008. Report arXiv:0802.3444vl. Available at http://arxiv.org/abs/ 0802.3444vl.
-
-
-
-
4
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
Bruno Blanchet, Martín Abadi, and Cédric Fournet. Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming, 75(1):3-51, 2008.
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
5
-
-
84944874831
-
Attacks on cryptoprocessor transaction sets
-
Proc of CHES 2001, of, Springer
-
Mike Bond. Attacks on cryptoprocessor transaction sets. In Proc of CHES 2001, vol. 2162 of LNCS, pages 220-234. Springer, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 220-234
-
-
Bond, M.1
-
6
-
-
70349288874
-
-
J.A. Bull and D.J. Otway. The authentication protocol. Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
-
J.A. Bull and D.J. Otway. The authentication protocol. Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
-
-
-
-
7
-
-
0041967380
-
-
Y. Chevalier, R. Ku7die;sters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In Proc. of LICS 2003, pages 261-270. IEEE, Comp. Soc. Press, 2003.
-
Y. Chevalier, R. Ku7die;sters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In Proc. of LICS 2003, pages 261-270. IEEE, Comp. Soc. Press, 2003.
-
-
-
-
9
-
-
84947780217
-
New Decidability Results for Fragments of First-order Logic and Application to Cryptographic Protocols
-
Proc. of RTA '2003, of, Springer
-
H. Comon-Lundh and V. Cortier. New Decidability Results for Fragments of First-order Logic and Application to Cryptographic Protocols. In Proc. of RTA '2003, vol. 2706 of LNCS, pages 148-164. Springer, 2003.
-
(2003)
LNCS
, vol.2706
, pp. 148-164
-
-
Comon-Lundh, H.1
Cortier, V.2
-
10
-
-
0042467908
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
IEEE Comp. Soc. Press
-
H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In Proc. of LICS 2003, pages 271-280. IEEE Comp. Soc. Press, 2003.
-
(2003)
Proc. of LICS
, pp. 271-280
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
11
-
-
1442311384
-
Securitj' properties: Two agents are sufficient
-
50(l-3):51-71
-
Hubert Comon-Lundh and Véronique Cortier. Securitj' properties: two agents are sufficient. Sci. Corn-put. Program., 50(l-3):51-71, 2004.
-
(2004)
Sci. Corn-put. Program
-
-
Comon-Lundh, H.1
Cortier, V.2
-
12
-
-
24944569389
-
The finite variant property: How to get rid of some algebraic properties
-
Proc. of RTA 2005, of, Springer
-
Hubert Comon-Lundh and Stéphanie Delaune. The finite variant property: How to get rid of some algebraic properties. In Proc. of RTA 2005, vol. 3467 of LNCS, pages 294-307. Springer, 2005.
-
(2005)
LNCS
, vol.3467
, pp. 294-307
-
-
Comon-Lundh, H.1
Delaune, S.2
-
13
-
-
35048847541
-
A formal theory of key conjuring
-
IEEE Comp. Soc. Press
-
V. Cortier, S. Delaune, and G. Steel. A formal theory of key conjuring. In Proc. of CSF 2006, pages 79-93. IEEE Comp. Soc. Press, 2007.
-
(2006)
Proc. of CSF
, pp. 79-93
-
-
Cortier, V.1
Delaune, S.2
Steel, G.3
-
14
-
-
35048861214
-
Automatic Analysis of the Security of XOR-Based Key Management Schemes
-
Proc. of TACAS 2007, of, Springer
-
V. Cortier, G. Keighren, and G. Steel. Automatic Analysis of the Security of XOR-Based Key Management Schemes. In Proc. of TACAS 2007, vol. 4424 of LNCS, pages 538-552. Springer, 2007.
-
(2007)
LNCS
, vol.4424
, pp. 538-552
-
-
Cortier, V.1
Keighren, G.2
Steel, G.3
-
15
-
-
35548966087
-
On the Automatic Analysis of Recursive Security Protocols with XOR
-
Proc. of STAGS 2007, of, Springer
-
R. Küsters and T. Truderung. On the Automatic Analysis of Recursive Security Protocols with XOR. In Proc. of STAGS 2007, vol. 4393 of LNCS, pages 646-657, Springer, 2007,
-
(2007)
LNCS
, vol.4393
, pp. 646-657
-
-
Küsters, R.1
Truderung, T.2
-
16
-
-
70349282773
-
Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach
-
Available at
-
R. Küsters and T. Truderung. Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach. Implementation, 2008. Available at http://infsec.uni-trier.de/software/ KuestersTruderung-XORPROVERIF- 2008.zip.
-
(2008)
Implementation
-
-
Küsters, R.1
Truderung, T.2
-
17
-
-
70349288875
-
-
R. Küsters and T. Truderang. Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach. Report arXiv:0808.0634vl, 2008. Available at http://arxiv.org/abs/0808.0634vl.
-
R. Küsters and T. Truderang. Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach. Report arXiv:0808.0634vl, 2008. Available at http://arxiv.org/abs/0808.0634vl.
-
-
-
-
18
-
-
84947904235
-
Session key distribution using smart cards
-
Proc. of EUROCRYPT 1996, of, Springer
-
V. Shoup and A. Rubin. Session key distribution using smart cards. In Proc. of EUROCRYPT 1996, vol. 1070 of LNCS, pages 321-331. Springer, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 321-331
-
-
Shoup, V.1
Rubin, A.2
-
19
-
-
26944468299
-
Deduction with XOR constraints in security API modelling
-
CADE, of, Springer
-
Graham Steel. Deduction with XOR constraints in security API modelling. In CADE, vol. 3632 of LNCS, pages 322-336. Springer, 2005.
-
(2005)
LNCS
, vol.3632
, pp. 322-336
-
-
Steel, G.1
-
20
-
-
26944478183
-
On the complexity of equational Horn clauses
-
Proc. of CADE 2005, of, Springer
-
K.N. Verma, H. Seidl, and T. Schwentick. On the complexity of equational Horn clauses. In Proc. of CADE 2005, vol. 3328 of LNCS, pages 337-352. Springer, 2005.
-
(2005)
LNCS
, vol.3328
, pp. 337-352
-
-
Verma, K.N.1
Seidl, H.2
Schwentick, T.3
|