Guessing Attacks and the Computational Soundness of Static Equivalence, Proc. 9th International Conference on Foundations of Software Science and Computation Structures (FoS- SaCS'06), pp.398-412, 2006. ,
DOI : 10.1007/11690634_27
Mobile values, new names, and secure communication, Proc. 28th Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.36-47, 1997. ,
DOI : 10.1145/266420.266432
Contributory Password-Authenticated Group Key Exchange with Join Capability, Proc. The Cryptographers' Track at the RSA Conference (CT-RSA'11), pp.142-160, 2011. ,
DOI : 10.1017/CBO9781139165464
URL : https://hal.archives-ouvertes.fr/hal-00915828
Smooth Projective Hashing for Conditionally Extractable Commitments, Advances in Cryptology ? CRYPTO'09, pp.671-689, 2009. ,
DOI : 10.1007/978-3-642-03356-8_39
URL : https://hal.archives-ouvertes.fr/inria-00419145
A framework for compositional verification of security protocols, Information and Computation, vol.206, issue.2-4, pp.425-459, 2008. ,
DOI : 10.1016/j.ic.2007.07.002
From One Session to Many: Dynamic Tags for Security Protocols, Proc. 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'08), pp.128-142, 2008. ,
DOI : 10.1007/978-3-540-89439-1_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.1133
Bounding Messages for Free in Security??Protocols, Proc. 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FST&TCS'07), pp.376-387, 2007. ,
DOI : 10.1007/978-3-540-77050-3_31
URL : https://hal.archives-ouvertes.fr/hal-01195943
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proc. 17th International Conference on Computer Aided Verification (CAV'05), pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Protocol initialization for the framework of universal composability, Cryptology ePrint Archive, 2004. ,
Deciding security of protocols against off-line guessing attacks, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.16-25, 2005. ,
DOI : 10.1145/1102120.1102125
Sécurité des protocoles cryptographiques : aspects logiques et calculatoires, Thèse de doctorat, 2007. ,
Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.72-84, 1992. ,
DOI : 10.1109/RISP.1992.213269
URL : http://academiccommons.columbia.edu/download/fedora_content/download/ac:127104/CONTENT/neke.pdf
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001. ,
DOI : 10.1109/CSFW.2001.930138
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5150
Automatic proof of strong secrecy for security protocols, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.86-100, 2004. ,
DOI : 10.1109/SECPRI.2004.1301317
Verification of Cryptographic Protocols: Tagging Enforces Termination, Proc. Foundations of Software Science and Computation Structures (FoS- SaCS'03), pp.136-152, 2003. ,
DOI : 10.1007/3-540-36576-1_9
Strong Cryptography from Weak Secrets, Progress in Cryptology ? AFRICACRYPT'10, pp.297-315, 2010. ,
DOI : 10.1007/978-3-642-12678-9_18
URL : https://hal.archives-ouvertes.fr/inria-00539542
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, Advances in Cryptology ? EUROCRYPT'00, pp.156-171, 2000. ,
DOI : 10.1007/3-540-45539-6_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.7667
Universally composable security: a new paradigm for cryptographic protocols, Proceedings 2001 IEEE International Conference on Cluster Computing, pp.136-145, 2001. ,
DOI : 10.1109/SFCS.2001.959888
Universally Composable Password-Based Key Exchange, Advances in Cryptology ? EUROCRYPT'05, pp.404-421, 2005. ,
DOI : 10.1007/11426639_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.419
Proving cryptographic protocols safe from guessing attacks, Proc. Foundations of Computer Security (FCS'02), 2002. ,
Analysing Password Protocol Security Against Off-line Dictionary Attacks, Electronic Notes in Theoretical Computer Science, vol.121, pp.47-63, 2005. ,
DOI : 10.1016/j.entcs.2004.10.007
URL : http://doi.org/10.1016/j.entcs.2004.10.007
Guess what? Here is a new tool that finds some new guessing attacks, Proc. of the Workshop on Issues in the Theory of Security (WITS'03), 2003. ,
Safely composing security protocols, Proc. 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), Lecture Notes in Computer Science, 2007. ,
DOI : 10.1007/978-3-540-77050-3_29
URL : https://hal.archives-ouvertes.fr/inria-00157889
Safely composing security protocols. Formal Methods in System Design, pp.1-36, 2009. ,
DOI : 10.1007/978-3-540-77050-3_29
URL : https://hal.archives-ouvertes.fr/inria-00157889
A derivation system and compositional logic for security protocols, Journal of Computer Security, vol.13, issue.3, pp.423-482, 2005. ,
DOI : 10.3233/JCS-2005-13304
URL : http://doi.org/10.3233/jcs-2005-13304
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks, Journal of Automated Reasoning, vol.40, issue.2, pp.85-124, 2006. ,
DOI : 10.1007/s10817-005-9017-7
URL : https://hal.archives-ouvertes.fr/inria-00578855
Protocol independence through disjoint encryption, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.24-34, 2000. ,
DOI : 10.1109/CSFW.2000.856923
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.298.3042
Password Authenticated Key Exchange by Juggling, Proc. 16th International Security Protocols Workshop, pp.159-171, 2008. ,
DOI : 10.1016/j.tcs.2005.11.038
How to Sync with Alice, 19th International Security Protocols Workshop, pp.170-178, 2011. ,
DOI : 10.1109/LCOMM.2003.822506
Strong password-only authenticated key exchange, ACM SIGCOMM Computer Communication Review, vol.26, issue.5, pp.5-26, 1996. ,
DOI : 10.1145/242896.242897
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.3216
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords, Advances in Cryptology ? EUROCRYPT'01, pp.475-494, 2001. ,
DOI : 10.1007/3-540-44987-6_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.9319
Analysing protocols subject to guessing attacks, Journal of Computer Security, vol.12, issue.1, pp.83-98, 2004. ,
DOI : 10.3233/JCS-2004-12104
What are multi-protocol guessing attacks and how to prevent them, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.77-82, 2002. ,
DOI : 10.1109/ENABL.2002.1029992
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.5700
Number theoretic attacks on secure password schemes, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.236-247, 1997. ,
DOI : 10.1109/SECPRI.1997.601340
Decidability of context-explicit security protocols, Journal of Computer Security, vol.13, issue.1, pp.135-165, 2005. ,
DOI : 10.3233/JCS-2005-13106
TPM Specification version 1.2. Parts 1?3, revision 103, 2007. ,