17 Bull's Authentication Protocol, Wired Equivalent Privacy Protocol, vol.17 ,
31 Elliptic Curve Digital Signature Algorithm (ECDSA), p.32 ,
Deciding knowledge in security protocols under equational theories, Proc. 31st International Colloquium on Automata, Languages, and Programming, pp.46-58, 2004. ,
DOI : 10.1016/j.tcs.2006.08.032
URL : https://hal.archives-ouvertes.fr/inria-00071420
On Name Generation and Set-Based Analysis in the Dolev-Yao Model, Proc. International Conference on Concurrency Theory (CONCUR'02), pp.499-514, 2002. ,
DOI : 10.1007/3-540-45694-5_33
On the symbolic reduction of processes with cryptographic functions, Theoretical Computer Science, vol.290, issue.1, pp.695-740, 2002. ,
DOI : 10.1016/S0304-3975(02)00090-7
URL : https://hal.archives-ouvertes.fr/inria-00072478
Programming Satan's computer, Computer Science Today: Recent Trends and Developments, pp.426-440, 1995. ,
DOI : 10.1007/BFb0015258
New multiparty authentication services and key agreement protocols, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.628-639, 2000. ,
DOI : 10.1109/49.839937
Problem areas for the IP security protocols, Proc. 6th USENIX Security Symposium, pp.1-16, 1996. ,
Secret sharing homomorphisms: Keeping shares of a secret sharing, Proc. Advances in Cryptology (CRYPTO'86), pp.251-260, 1987. ,
Relating multiset rewriting and process algebras for security protocol analysis, Proc. 3rd Workshop on Issues in the Theory of Security (WITS'03), 2003. ,
DOI : 10.3233/JCS-2005-13102
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001. ,
DOI : 10.1109/CSFW.2001.930138
URL : http://www.mpi-sb.mpg.de/~blanchet/publications/./BlanchetCSFW01.ps.gz
Cryptographic Protocol Verifier User Manual, 2004. ,
DOI : 10.1109/csfw.2001.930138
URL : http://www.mpi-sb.mpg.de/~blanchet/publications/./BlanchetCSFW01.ps.gz
Verification of cryptographic protocols: Tagging enforces termination, Proc. 6th International Conference on Foundations of Software Science and Computation Structures (FOSSACS'03), pp.136-152, 2003. ,
DOI : 10.1016/j.tcs.2004.10.018
URL : https://doi.org/10.1016/j.tcs.2004.10.018
Symbolic Trace Analysis of Cryptographic Protocols, Proc. 28th International Colloquium on Automata, Languages, and Programming (ICALP'01), pp.667-681, 2001. ,
DOI : 10.1007/3-540-48224-5_55
Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation, Proc. 28th International Symposium on Mathematical Foundations of Computer Science (MFCS'03), pp.269-278, 2003. ,
DOI : 10.1007/978-3-540-45138-9_21
Intercepting mobile communications, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.180-188, 2001. ,
DOI : 10.1145/381677.381695
A symbolic decision procedure for cryptographic protocols with time stamps, Proc. 15th International Conference on Concurrency Theory, pp.177-192, 2004. ,
The authentication protocol, 1997. ,
A logic of authentication, Proc. 12th ACM Symposium on Operating System Principles (SOSP'89), pp.1-13, 1989. ,
An NP decision procedure for protocol insecurity with XOR, Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), pp.261-270, 2003. ,
DOI : 10.1109/lics.2003.1210066
URL : https://hal.archives-ouvertes.fr/inria-00103954
Deciding the Security of Protocols with Commuting Public Key Encryption, Proc. Workshop on Automated Reasoning for Security Protocol Analysis, pp.53-63, 2004. ,
DOI : 10.1016/j.entcs.2004.05.019
URL : https://hal.archives-ouvertes.fr/inria-00100013
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents, Proc. 23rd Conference on Foundations of Software Technology and Theoretical Computer Science (FST&TCS'03), pp.124-135, 2003. ,
DOI : 10.1007/978-3-540-24597-1_11
URL : https://hal.archives-ouvertes.fr/inria-00103935
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions, Proc. 17th International Workshop in Computer Science Logic (CSL'03), pp.128-141, 2003. ,
DOI : 10.1007/978-3-540-45220-1_13
URL : https://hal.archives-ouvertes.fr/inria-00071714
Automated Unbounded Verification of Security Protocols, Proc. 14th International Conference on Computer Aided Verification (CAV'02), pp.324-337, 2002. ,
DOI : 10.1007/3-540-45657-0_24
URL : https://hal.archives-ouvertes.fr/inria-00100916
A survey of authentication protocol literature, 1997. ,
A robust and verifiable cryptographically secure election scheme, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985), pp.372-382, 1985. ,
DOI : 10.1109/SFCS.1985.2
URL : http://research.microsoft.com/crypto/papers/elect.ps
Tree automata with one memory set constraints and cryptographic protocols, Theoretical Computer Science, vol.331, issue.1, 2001. ,
DOI : 10.1016/j.tcs.2004.09.036
URL : https://hal.archives-ouvertes.fr/inria-00000553
Intruder Theories (Ongoing Work), Proc. 7th International Conference on Foundations of Software Science and Computation Structures, pp.1-4, 2004. ,
DOI : 10.1007/978-3-540-24727-2_1
New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols, Proc. 14th International Conference on Rewriting Techniques and Applications (RTA'2003), pp.148-164, 2003. ,
DOI : 10.1007/3-540-44881-0_12
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., pp.271-280, 2003. ,
DOI : 10.1109/LICS.2003.1210067
Easy intruder deductions In Verification: Theory & Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday, LNCS, vol.2772, pp.225-242, 2003. ,
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, Proc. 14th Annual International Cryptology Conference (CRYPTO'94), pp.174-187, 1994. ,
DOI : 10.1007/3-540-48658-5_19
Multi-Authority Secret-Ballot Elections with Linear Work, Proc. International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'96), pp.72-83, 1996. ,
DOI : 10.1007/3-540-68339-9_7
A secure and optimally efficient multi-authority election scheme, Proc. International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'97, pp.103-118, 1997. ,
DOI : 10.1002/ett.4460080506
On the security of ping-pong protocols, Proc. Advances in Cryptology (CRYPTO'82), pp.177-186, 1983. ,
Computability, complexity and languages, Computer Science and Applied Mathematics, issue.7, pp.128-132, 1983. ,
A decision procedure for the verification of security protocols with explicit destructors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.278-287, 2004. ,
DOI : 10.1145/1030083.1030121
URL : https://hal.archives-ouvertes.fr/inria-00579012
Introduction to Cryptography : Principles and Applications, 2002. ,
Automatic Verification of Time Sensitive Cryptographic Protocols, Proc. 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.342-356, 2004. ,
DOI : 10.1007/978-3-540-24730-2_27
URL : http://software.imdea.org/~pierreganty/mypubs/dg-tacas04.pdf
Timestamps in key distribution protocols, Communications of the ACM, vol.24, issue.8, pp.533-536, 1981. ,
DOI : 10.1145/358722.358740
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
URL : http://www.cs.rutgers.edu/~tdnguyen/classes/cs671/presentations/Arvind-NEWDIRS.pdf
Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard, Computer, vol.10, issue.6, pp.74-84, 1977. ,
DOI : 10.1109/C-M.1977.217750
Undecidability of bounded security protocols, Proc. Workshop on Formal Methods and Security Protocols (FMSP'99), 1999. ,
Analysing Time Dependent Security Properties in CSP Using PVS, Proc. 6th European Symposium on Research in Computer Security (ESORICS'00), pp.222-237, 2000. ,
DOI : 10.1007/10722599_14
URL : http://www.dcs.rhbnc.ac.uk/research/formal/steve/papers/timepvs.ps.gz
On the security of multi-party ping-pong protocols, Proc. 24th Annual Symposium on Foundations of Computer Science (FOCS'83), pp.34-39, 1983. ,
On the security of ping-pong protocols when implemented using the RSA, Proc. Advances in Cryptology (CRYPTO'85), pp.58-72, 1986. ,
Sharing Decryption in the Context of Voting or Lotteries, Proc. 4th International Conference on Financial Cryptography (FC'00), pp.90-104, 2001. ,
DOI : 10.1007/3-540-45472-1_7
URL : https://hal.archives-ouvertes.fr/inria-00565275
Foundations of Cryptography, 2001. ,
DOI : 10.1017/cbo9780511546891
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : https://doi.org/10.1016/0022-0000(84)90070-9
The knowledge complexity of interactive proof-systems, Proc. 17th annual ACM Symposium on Theory of Computing, pp.291-304, 1985. ,
Using one-way functions for authentication, ACM SIGCOMM Computer Communication Review, vol.19, issue.5, pp.8-11, 1989. ,
DOI : 10.1145/74681.74682
URL : http://www.javasoft.com/people/gong/papers/one-way.ps.gz
Abstraction and resolution modulo AC: How to verify Diffie???Hellman-like protocols automatically, The Journal of Logic and Algebraic Programming, vol.64, issue.2, 2004. ,
DOI : 10.1016/j.jlap.2004.09.004
URL : https://doi.org/10.1016/j.jlap.2004.09.004
On the security of SPLICE/AS ??? The authentication system in WIDE Internet, Information Processing Letters, vol.53, issue.2, pp.91-101, 1995. ,
DOI : 10.1016/0020-0190(94)00175-X
Compiling and Verifying Security Protocols, Proc. of 7th International Conference on Logic for Programming and Automated Reasoning (LPAR'00), pp.131-160, 2000. ,
DOI : 10.1007/3-540-44404-1_10
URL : https://hal.archives-ouvertes.fr/inria-00072712
Mutual Authentication for Low-Power Mobile Devices, Proc. 5th International Conference on Financial Cryptography (FC'01), pp.178-195, 2002. ,
DOI : 10.1007/3-540-46088-8_17
URL : http://www.di.ens.fr/users/pointche/Documents/Papers/2001_fcB.pdf
The Elliptic Curve Digital Signature Algorithm (ECDSA), International Journal of Information Security, vol.1, issue.1, 1999. ,
DOI : 10.1007/s102070100002
URL : http://cacr.math.uwaterloo.ca/~ajmeneze/publications/ecdsa.ps
An E-unification Algorithm for Analyzing Protocols That Use Modular Exponentiation, Proc. 14th International Conference on Rewriting Techniques and Applications (RTA'2003), pp.165-179, 2003. ,
DOI : 10.1007/3-540-44881-0_13
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks, Proc. 2nd International Workshop on Security Issues in Coordination Models, Languages and Systems, 2005. ,
DOI : 10.1016/j.entcs.2004.11.043
Summary of AMP (authentication and key agreement via memorable passwords) Draft Document, 2003. ,
Intruder Deduction for AC-Like Equational Theories with Homomorphisms, Proc. 16th International Conference on Rewriting Techniques and Applications (RTA'05), 2005. ,
DOI : 10.1007/978-3-540-32033-3_23
An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters, vol.56, issue.3, pp.131-133, 1995. ,
DOI : 10.1016/0020-0190(95)00144-2
URL : http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/NSPKP.ps
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Proc. 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), pp.147-166, 1996. ,
DOI : 10.1007/3-540-61042-1_43
URL : http://www.cs.ubc.ca/~ajh/courses/cpsc513/NSFDR.ps
Casper: A compiler for the analysis of security protocols, Proc. 10th Computer Security Foundations Workshop (CSFW'97, pp.18-30, 1997. ,
Towards a completeness result for model checking of security protocols, Proc. 11th Computer Security Foundations Workshop (CSFW'98), pp.96-106, 1998. ,
Analysing protocols subject to guessing attacks, Proc. of the Workshop on Issues in the Theory of Security (WITS'02), 2002. ,
DOI : 10.3233/JCS-2004-12104
URL : http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/guessingJCS.ps
Using CSP to detect errors in the TMN protocol, IEEE Transactions on Software Engineering, vol.23, issue.10, pp.659-669, 1997. ,
DOI : 10.1109/32.637148
On the Relative Soundness of the Free Algebra Model for Public Key Encryption, Proc. 4th Workshop on Issues in the Theory of Security, pp.81-95, 2004. ,
DOI : 10.1016/j.entcs.2004.05.018
More Efficient Password-Authenticated Key Exchange, Proc. Cryptographer's Track at RSA Conference, pp.361-377, 2001. ,
DOI : 10.1007/3-540-45353-9_27
Password-authenticated key exchange based on RSA, Proc. 6th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'00), pp.599-613, 2000. ,
Language generation and verification in the NRL protocol analyzer, Proc. 9th Computer Seurity Foundation Workshop (CSFW'96), pp.48-62, 1996. ,
Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives, Proc. 1st Workshop on Issues in the Theory of Security, pp.87-92, 2000. ,
DOI : 10.21236/ADA464085
Towards a hierarchy of cryptographic protocol models, Proc. Workshop on Formal Methods in Security Engineering (FMSE'03), 2003. ,
On the freedom of decryption, Information Processing Letters, vol.86, issue.6, pp.329-333, 2003. ,
DOI : 10.1016/S0020-0190(03)00211-4
Constraint solving for bounded-process cryptographic protocol analysis, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, 2001. ,
DOI : 10.1145/501983.502007
Symbolic protocol analysis with products and Diffie-Hellman exponentiation, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.47-62, 2003. ,
DOI : 10.1109/CSFW.2003.1212704
Use of Elliptic Curves in Cryptography, Proc. Advances in Cryptology, pp.417-426, 1986. ,
DOI : 10.1007/3-540-39799-X_31
Automated analysis of cryptographic protocols using Mur?, Proc. 1997 IEEE Symposium on Security and Privacy, pp.141-151, 1997. ,
DOI : 10.1109/secpri.1997.601329
A New Public-Key Cryptosystem, Proc. International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'97), pp.27-37, 1997. ,
DOI : 10.1007/3-540-69053-0_3
SKIPJACK and KEA algorithm secification,Version 2, 1998. ,
Using encryption for authentication in large networks of computers, Communications of the ACM, vol.21, issue.12, pp.993-999, 1978. ,
DOI : 10.1145/359657.359659
A new public-key cryptosystem as secure as factoring, Proc. International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'98), pp.308-318, 1998. ,
DOI : 10.1007/BFb0054135
URL : http://www.di.ens.fr/~pointche/proposals/Documents/OkUc98.ps.gz
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proc. International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'99)Czech Republic), pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Mechanized proofs for a recursive authentication protocol, Proceedings 10th Computer Security Foundations Workshop, pp.84-95, 1997. ,
DOI : 10.1109/CSFW.1997.596790
URL : ftp://ftp.cl.cam.ac.uk/papers/reports/TR418-lcp-recur.ps.gz
On the perfect encryption assumption, Proc. 1st Workshop on Issues in the Theory of Security, pp.42-45, 2000. ,
A security analysis of the cliques protocols suites, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.73-81, 2001. ,
DOI : 10.1109/CSFW.2001.930137
A decidable subclass of unbounded security protocols, Proc. IFIP Workshop on Issues in the Theory of Security (WITS'03), pp.11-20, 2003. ,
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well, Proc. 23rd Conference on Foundations of Software Technology and Theoretical Computer Science (FST&TCS'03), pp.363-374, 2003. ,
DOI : 10.1007/978-3-540-24597-1_31
URL : http://www.cmi.ac.in/~spsuresh/pdffiles/fsttcs03.pdf
Protocol insecurity with finite number of sessions is NP-complete, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.174-190, 2001. ,
DOI : 10.1109/CSFW.2001.930145
URL : https://hal.archives-ouvertes.fr/inria-00100411
An attack on a recursive authentication protocol A cautionary tale, Information Processing Letters, vol.65, issue.1, pp.7-10, 1998. ,
DOI : 10.1016/S0020-0190(97)00180-4
Integrating security in a large distributed system, ACM Transactions on Computer Systems, vol.7, issue.3, pp.247-280, 1989. ,
DOI : 10.1145/65000.65002
Applied Cryptography, 1996. ,
Flat and one-variable clauses, Proc. of 11thth International Conference on Logic for Programming and Automated Reasoning (LPAR'04), LNCS, p. To appear, 2005. ,
DOI : 10.1145/1380572.1380577
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation, Proc. 13th European Symposium On Programming, pp.355-369, 2004. ,
DOI : 10.1007/978-3-540-24725-8_25
Session Key Distribution Using Smart Cards, Proc. International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'96), pp.321-330, 1996. ,
DOI : 10.1007/3-540-68339-9_28
URL : http://dsns.csie.nctu.edu.tw/research/crypto/HTML/PDF/E96/321.PDF
Cryptanalysis and protocol failures, Communications of the ACM, vol.37, issue.11, pp.56-65, 1994. ,
DOI : 10.1145/188280.188298
Data Encryption Standard: past and future, Proc. IEEE, pp.550-559, 1988. ,
DOI : 10.1109/5.4441
Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, pp.31-37, 1996. ,
DOI : 10.1145/238168.238182
URL : http://www.isi.edu/~gts/CLIQUES/paper/stw96.ps.gz
Key Distribution Protocol for Digital Mobile Communication Systems, Proc. 9th Annual International Cryptology Conference (CRYPTO'89), pp.324-333, 1989. ,
DOI : 10.1007/0-387-34805-0_30
Sécurité des protocoles cryptographiques: décidabilité et complexité, 2003. ,
Two-Way Equational Tree Automata for AC-Like Theories: Decidability and Closure Properties, Proc. 14th International Conference on Rewriting Techniques and Applications (RTA'03), pp.180-196, 2003. ,
DOI : 10.1007/3-540-44881-0_14
Efficient and mutually authenticated key exchange protocol for low power computing devices, Proc. 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'01), pp.272-289, 2001. ,
The secure remote password protocol, Proc. 1998 Internet Society Network and Distributed System Security Symposium, pp.97-111, 1998. ,