메뉴 건너뛰기




Volumn 205, Issue 4, 2007, Pages 581-623

Intruder deduction for the equational theory of Abelian groups with distributive encryption

Author keywords

[No Author keywords available]

Indexed keywords

BINS; CALCULATIONS; GROUP THEORY;

EID: 84855190787     PISSN: 08905401     EISSN: 10902651     Source Type: Journal    
DOI: 10.1016/j.ic.2006.10.008     Document Type: Article
Times cited : (18)

References (40)
  • 1
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key authentication protocol
    • G. Lowe, An attack on the Needham-Schroeder public key authentication protocol, Information Processing Letters 56(3) (1995) 131-133.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 4
    • 85031206101 scopus 로고    scopus 로고
    • Available at
    • AVISPA Project, Avispa protocol library, 2003. Available at http://www.avispa-project.org/.
    • (2003) Avispa Protocol Library
  • 5
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi, A. D. Gordon, A calculus for cryptographic protocols: the spi calculus, Information and Computation 148(1) (1999) 1-70. (Pubitemid 129608821)
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 7
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • IEEE Computer Society Press
    • D. Dolev, A. Yao, On the security of public-key protocols, in: Transactions on Information Theory, vol. 29, IEEE Computer Society Press, 1983, pp. 198-208.
    • (1983) Transactions on Information Theory , vol.29 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 8
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • V. Cortier, S. Delaune, P. Lafourcade, A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security 14(1) (2006) 1-43. (Pubitemid 43177436)
    • (2006) Journal of Computer Security , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 10
    • 0002783180 scopus 로고
    • Using one-way functions for authentication
    • L. Gong, Using one-way functions for authentication, SIGCOMM Computer Communication 19(5) (1989) 8-11.
    • (1989) SIGCOMM Computer Communication , vol.19 , Issue.5 , pp. 8-11
    • Gong, L.1
  • 14
    • 70349714960 scopus 로고    scopus 로고
    • Symbolic protocol analysis with products and Diffie-Hellman exponentiation
    • IEEE Comp. Soc. Press, Pacific Grove California, USA
    • J. Millen, V. Shmatikov, Symbolic protocol analysis with products and Diffie-Hellman exponentiation, in: Proceedings of the 16th Computer Security Foundation Workshop (CSFW'03), IEEE Comp. Soc. Press, Pacific Grove (California, USA), 2003, pp. 47-62.
    • (2003) Proceedings of the 16th Computer Security Foundation Workshop (CSFW'03) , pp. 47-62
    • Millen, J.1    Shmatikov, V.2
  • 15
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    • P. K. Pandya, J. Radhakrishnan Eds., Springer
    • Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, in: P. K. Pandya, J. Radhakrishnan (Eds.), FSTTCS, Lecture Notes in Computer Science, vol. 2914, Springer, 2003, pp. 124-135.
    • (2003) FSTTCS, Lecture Notes in Computer Science , vol.2914 , pp. 124-135
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 16
    • 35248836596 scopus 로고    scopus 로고
    • Easy intruder deductions
    • Verification: Theory and Practice (Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday)
    • H. Comon-Lundh, R. Treinen, Easy intruder deductions, in: N. Dershowitz (Ed.), Verification: Theory and Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday, Lecture Notes in Computer Science, vol. 2772, Springer-Verlag, 2003, pp. 225-242. (Pubitemid 38318527)
    • (2003) Lecture Notes in Computer Science , Issue.2772 , pp. 225-242
    • Comon-Lundh, H.1    Treinen, R.2
  • 17
    • 31344437591 scopus 로고    scopus 로고
    • Easy intruder deduction problems with homomorphisms
    • DOI 10.1016/j.ipl.2005.11.008, PII S0020019005003248
    • S. Delaune, Easy intruder deduction problems with homomorphisms, Information Processing Letters 97(6) (2006) 213-218. (Pubitemid 43144825)
    • (2006) Information Processing Letters , vol.97 , Issue.6 , pp. 213-218
    • Delaune, S.1
  • 20
    • 33745778843 scopus 로고    scopus 로고
    • Deciding security of protocols against off-line guessing attacks
    • DOI 10.1145/1102120.1102125, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
    • M. Baudet, Deciding security of protocols against off-line guessing attacks, in: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), ACM Press, Alexandria, Virginia, USA, 2005, pp. 16-25. (Pubitemid 44021986)
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security , pp. 16-25
    • Baudet, M.1
  • 21
    • 14844335720 scopus 로고    scopus 로고
    • A decision procedure for the verification of security protocols with explicit destructors
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • S. Delaune, F. Jacquemard, A decision procedure for the verification of security protocols with explicit destructors, in: V. Atluri, B. Pfitzmann, P. McDaniel (Eds.), Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04), ACM Press, Washington, DC, USA, 2004, pp. 278-287. (Pubitemid 40338209)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 278-287
    • Delaune, S.1    Jacquemard, E.2
  • 23
    • 28144451656 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under (many more) equational theories
    • Proceedings of the 18th IEEE Computer Security Foundations Workshop
    • M. Abadi, V. Cortier, Deciding knowledge in security protocols under (many more) equational theories, in: CSFW'05: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW'05), IEEE Computer Society, Washington, DC, USA, 2005, pp. 62-76. (Pubitemid 41696421)
    • (2005) Proceedings of the Computer Security Foundations Workshop , pp. 62-76
    • Abadi, M.1    Cortier, V.2
  • 24
    • 26444458330 scopus 로고    scopus 로고
    • Combining intruder theories
    • Automata, Languages and Programming: 32nd International Colloquium, ICALP 2005. Proceedings
    • Y. Chevalier, M. Rusinowitch, Combining intruder theories, in: L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, M. Yung (Eds.), ICALP, Lecture Notes in Computer Science, vol. 3580, Springer, 2005, pp. 639-651. (Pubitemid 41436135)
    • (2005) Lecture Notes in Computer Science , vol.3580 , pp. 639-651
    • Chevalier, Y.1    Rusinowitch, M.2
  • 30
    • 19744367735 scopus 로고    scopus 로고
    • Luca Viganó, Ofmc: A symbolic model checker for security protocols
    • published online December
    • D. Basin, S. Mödersheim, Luca Viganó, Ofmc:a symbolic model checker for security protocols, International Journal of Information Security 4(3) (2005) 181-208, published online December 2004.
    • (2004) International Journal of Information Security , vol.4 , Issue.3 , pp. 181-208
    • Basin, D.1    Mödersheim, S.2
  • 34
    • 72649084870 scopus 로고    scopus 로고
    • Intruder deduction for AC-like equational theories with homomorphisms
    • LSV, ENS de Cachan, November
    • P. Lafourcade, D. Lugiez, R. Treinen, Intruder deduction for AC-like equational theories with homomorphisms, Research Report LSV-04-16, LSV, ENS de Cachan, November 2004.
    • (2004) Research Report LSV-04-16
    • Lafourcade, P.1    Lugiez, D.2    Treinen, R.3
  • 35
    • 0027578148 scopus 로고
    • Automatic recognition of tractability in inference relations
    • D. A. McAllester, Automatic recognition of tractability in inference relations, Journal of the ACM 40(2) (1993) 284-303.
    • (1993) Journal of the ACM , vol.40 , Issue.2 , pp. 284-303
    • McAllester, D.A.1
  • 36
    • 0000709547 scopus 로고
    • Finiteness of the odd perfect and primitive abundant numbers with n prime factors
    • L. Dickson, Finiteness of the odd perfect and primitive abundant numbers with n prime factors, American Journal Mathematical Society 35(1913) 413-422.
    • (1913) American Journal Mathematical Society , vol.35 , pp. 413-422
    • Dickson, L.1
  • 37
    • 0026944928 scopus 로고
    • On the regular structure of prefix rewriting
    • DOI 10.1016/0304-3975(92)90278-N
    • D. Caucal, On the regular structure of prefix rewriting, Theoretical Computer Science 106(1) (1992) 61-86. (Pubitemid 23605842)
    • (1992) Theoretical Computer Science , vol.106 , Issue.1 , pp. 61-86
    • Caucal Didier1
  • 39
    • 24944560619 scopus 로고    scopus 로고
    • Intruder deduction for AC-like equational theories with homomorphisms
    • Term Rewriting and Applications: 16th International Conference, RTA 2005, Proceedings
    • P. Lafourcade, D. Lugiez, R. Treinen, Intruder deduction for AC-like equational theories with homomorphisms, in: J. Giesl (Ed.), Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), Lecture Notes in Computer Science, vol. 467, Springer-Verlag, Nara, Japan, 2005, pp. 308-322. (Pubitemid 41313365)
    • (2005) Lecture Notes in Computer Science , vol.3467 , pp. 308-322
    • Lafourcade, P.1    Lugiez, D.2    Treinen, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.