Reconciling two views of cryptography (the computational soundness of formal encryption), IFIP International Conference on Theoretical Computer Science (IFIP TCS2000), 2000. ,
The Group Diffie-Hellman Problems, Proceedings of Selected Areas in Cryptography, 2002. ,
DOI : 10.1007/3-540-36492-7_21
A secure and efficient conference key distribution system (extended abstract), EUROCRYPT, pp.275-286, 1994. ,
A secure and scalable Group Key Exchange system, Information Processing Letters, vol.94, issue.3, pp.137-143, 2005. ,
DOI : 10.1016/j.ipl.2005.01.003
Variations of Diffie-Hellman Problem, Proceedings of the Fifth Conference on Information and Communications Security (ICIS 2003), pp.301-312, 2003. ,
DOI : 10.1007/978-3-540-39927-8_28
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents, Proceedings of the Twenty-Third Conference on Foundations of Software Technology and Theoretical Computer Science, 2003. ,
DOI : 10.1007/978-3-540-24597-1_11
URL : https://hal.archives-ouvertes.fr/inria-00103935
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, 1976. ,
DOI : 10.1109/TIT.1976.1055638
On the security of public key protocols, IEEE Transactions on Information Theory, 1983. ,
Towards computationally sound symbolic analysis of key exchange protocols, Proceedings of the 2005 ACM workshop on Formal methods in security engineering , FMSE '05, 2005. ,
DOI : 10.1145/1103576.1103580
Computational soundness for standard assumptions of formal cryptography, 2004. ,
Scalable Protocols for Authenticated Group Key Exchange, Proc. of Crypto '03, pp.110-125, 2003. ,
DOI : 10.1007/978-3-540-45146-4_7
Adaptive Security of Symbolic Encryption, Proceedings of the Theory of cryptography conference, 2005. ,
DOI : 10.1007/978-3-540-30576-7_10
Symbolic protocol analysis with products and diffiehellman exponentiation, Proceedings of the Sixteenth Computer Security Foundations Workshop, 2003. ,
Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, 1996. ,
DOI : 10.1145/238168.238182