메뉴 건너뛰기




Volumn , Issue , 2008, Pages 129-138

Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach

Author keywords

Algebraic properties; Security protocols

Indexed keywords

ALGEBRAIC PROPERTIES; AUTOMATIC ANALYSIS; CRYPTOGRAPHIC PROTOCOLS; EXCLUSIVE-OR; HORN THEORY; LARGE CLASS; PROTOCOL ANALYSIS; SECURITY ANALYSIS; SECURITY PROTOCOLS; SEVERAL PROTOCOLS;

EID: 70349286236     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455788     Document Type: Conference Paper
Times cited : (28)

References (20)
  • 1
    • 70349293409 scopus 로고    scopus 로고
    • CCA Basic Services Reference and Guide: CCA Basic Services Reference and Guide, 2003. Available at http: //www-306.ibm.com/security/cryptocards/pdfs/CCA- Basic-Services-241-Revised-20030918.pdf.
    • CCA Basic Services Reference and Guide: CCA Basic Services Reference and Guide, 2003. Available at http: //www-306.ibm.com/security/cryptocards/pdfs/CCA- Basic-Services-241-Revised-20030918.pdf.
  • 2
    • 0034822279 scopus 로고    scopus 로고
    • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    • IEEE Comp. Soc. Press
    • B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In Proc. of CSFW-14, pages 82-96. IEEE Comp. Soc. Press, 2001.
    • (2001) Proc. of CSFW-14 , pp. 82-96
    • Blanchet, B.1
  • 3
    • 70349294955 scopus 로고    scopus 로고
    • Bruno Blanchet. Automatic verification of correspondences for security protocols, 2008. Report arXiv:0802.3444vl. Available at http://arxiv.org/abs/ 0802.3444vl.
    • Bruno Blanchet. Automatic verification of correspondences for security protocols, 2008. Report arXiv:0802.3444vl. Available at http://arxiv.org/abs/ 0802.3444vl.
  • 4
    • 38649141810 scopus 로고    scopus 로고
    • Automated verification of selected equivalences for security protocols
    • Bruno Blanchet, Martín Abadi, and Cédric Fournet. Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming, 75(1):3-51, 2008.
    • (2008) Journal of Logic and Algebraic Programming , vol.75 , Issue.1 , pp. 3-51
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 5
    • 84944874831 scopus 로고    scopus 로고
    • Attacks on cryptoprocessor transaction sets
    • Proc of CHES 2001, of, Springer
    • Mike Bond. Attacks on cryptoprocessor transaction sets. In Proc of CHES 2001, vol. 2162 of LNCS, pages 220-234. Springer, 2001.
    • (2001) LNCS , vol.2162 , pp. 220-234
    • Bond, M.1
  • 6
    • 70349288874 scopus 로고    scopus 로고
    • J.A. Bull and D.J. Otway. The authentication protocol. Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
    • J.A. Bull and D.J. Otway. The authentication protocol. Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
  • 7
    • 0041967380 scopus 로고    scopus 로고
    • Y. Chevalier, R. Ku7die;sters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In Proc. of LICS 2003, pages 261-270. IEEE, Comp. Soc. Press, 2003.
    • Y. Chevalier, R. Ku7die;sters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In Proc. of LICS 2003, pages 261-270. IEEE, Comp. Soc. Press, 2003.
  • 9
    • 84947780217 scopus 로고    scopus 로고
    • New Decidability Results for Fragments of First-order Logic and Application to Cryptographic Protocols
    • Proc. of RTA '2003, of, Springer
    • H. Comon-Lundh and V. Cortier. New Decidability Results for Fragments of First-order Logic and Application to Cryptographic Protocols. In Proc. of RTA '2003, vol. 2706 of LNCS, pages 148-164. Springer, 2003.
    • (2003) LNCS , vol.2706 , pp. 148-164
    • Comon-Lundh, H.1    Cortier, V.2
  • 10
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • IEEE Comp. Soc. Press
    • H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In Proc. of LICS 2003, pages 271-280. IEEE Comp. Soc. Press, 2003.
    • (2003) Proc. of LICS , pp. 271-280
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 11
    • 1442311384 scopus 로고    scopus 로고
    • Securitj' properties: Two agents are sufficient
    • 50(l-3):51-71
    • Hubert Comon-Lundh and Véronique Cortier. Securitj' properties: two agents are sufficient. Sci. Corn-put. Program., 50(l-3):51-71, 2004.
    • (2004) Sci. Corn-put. Program
    • Comon-Lundh, H.1    Cortier, V.2
  • 12
    • 24944569389 scopus 로고    scopus 로고
    • The finite variant property: How to get rid of some algebraic properties
    • Proc. of RTA 2005, of, Springer
    • Hubert Comon-Lundh and Stéphanie Delaune. The finite variant property: How to get rid of some algebraic properties. In Proc. of RTA 2005, vol. 3467 of LNCS, pages 294-307. Springer, 2005.
    • (2005) LNCS , vol.3467 , pp. 294-307
    • Comon-Lundh, H.1    Delaune, S.2
  • 13
    • 35048847541 scopus 로고    scopus 로고
    • A formal theory of key conjuring
    • IEEE Comp. Soc. Press
    • V. Cortier, S. Delaune, and G. Steel. A formal theory of key conjuring. In Proc. of CSF 2006, pages 79-93. IEEE Comp. Soc. Press, 2007.
    • (2006) Proc. of CSF , pp. 79-93
    • Cortier, V.1    Delaune, S.2    Steel, G.3
  • 14
    • 35048861214 scopus 로고    scopus 로고
    • Automatic Analysis of the Security of XOR-Based Key Management Schemes
    • Proc. of TACAS 2007, of, Springer
    • V. Cortier, G. Keighren, and G. Steel. Automatic Analysis of the Security of XOR-Based Key Management Schemes. In Proc. of TACAS 2007, vol. 4424 of LNCS, pages 538-552. Springer, 2007.
    • (2007) LNCS , vol.4424 , pp. 538-552
    • Cortier, V.1    Keighren, G.2    Steel, G.3
  • 15
    • 35548966087 scopus 로고    scopus 로고
    • On the Automatic Analysis of Recursive Security Protocols with XOR
    • Proc. of STAGS 2007, of, Springer
    • R. Küsters and T. Truderung. On the Automatic Analysis of Recursive Security Protocols with XOR. In Proc. of STAGS 2007, vol. 4393 of LNCS, pages 646-657, Springer, 2007,
    • (2007) LNCS , vol.4393 , pp. 646-657
    • Küsters, R.1    Truderung, T.2
  • 16
    • 70349282773 scopus 로고    scopus 로고
    • Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach
    • Available at
    • R. Küsters and T. Truderung. Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach. Implementation, 2008. Available at http://infsec.uni-trier.de/software/ KuestersTruderung-XORPROVERIF- 2008.zip.
    • (2008) Implementation
    • Küsters, R.1    Truderung, T.2
  • 17
    • 70349288875 scopus 로고    scopus 로고
    • R. Küsters and T. Truderang. Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach. Report arXiv:0808.0634vl, 2008. Available at http://arxiv.org/abs/0808.0634vl.
    • R. Küsters and T. Truderang. Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach. Report arXiv:0808.0634vl, 2008. Available at http://arxiv.org/abs/0808.0634vl.
  • 18
    • 84947904235 scopus 로고    scopus 로고
    • Session key distribution using smart cards
    • Proc. of EUROCRYPT 1996, of, Springer
    • V. Shoup and A. Rubin. Session key distribution using smart cards. In Proc. of EUROCRYPT 1996, vol. 1070 of LNCS, pages 321-331. Springer, 1996.
    • (1996) LNCS , vol.1070 , pp. 321-331
    • Shoup, V.1    Rubin, A.2
  • 19
    • 26944468299 scopus 로고    scopus 로고
    • Deduction with XOR constraints in security API modelling
    • CADE, of, Springer
    • Graham Steel. Deduction with XOR constraints in security API modelling. In CADE, vol. 3632 of LNCS, pages 322-336. Springer, 2005.
    • (2005) LNCS , vol.3632 , pp. 322-336
    • Steel, G.1
  • 20
    • 26944478183 scopus 로고    scopus 로고
    • On the complexity of equational Horn clauses
    • Proc. of CADE 2005, of, Springer
    • K.N. Verma, H. Seidl, and T. Schwentick. On the complexity of equational Horn clauses. In Proc. of CADE 2005, vol. 3328 of LNCS, pages 337-352. Springer, 2005.
    • (2005) LNCS , vol.3328 , pp. 337-352
    • Verma, K.N.1    Seidl, H.2    Schwentick, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.