On the symbolic reduction of processes with cryptographic functions, Theoretical Computer Science, vol.290, issue.1, pp.695-740, 2003. ,
DOI : 10.1016/S0304-3975(02)00090-7
URL : https://hal.archives-ouvertes.fr/inria-00072478
The Avispa Tool for the automated validation of internet security protocols and applications, Proceedings of CAV 2005, Computer Aided Verification ,
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols, Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, pp.91-108, 2004. ,
DOI : 10.1016/j.entcs.2004.05.021
Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures, Journal of Symbolic Computing, pp.211-243, 1996. ,
OFMC: A symbolic model checker for security protocols, International Journal of Information Security, vol.7, issue.3, pp.181-208, 2005. ,
DOI : 10.1007/s10207-004-0055-7
Automatic Verification of Security Protocols Using Approximations, INRIA Research Report, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00070291
Symbolic Trace Analysis of Cryptographic Protocols, Proceedings of the 28th ICALP'01, pp.667-681, 2001. ,
DOI : 10.1007/3-540-48224-5_55
An NP decision procedure for protocol insecurity with XOR, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., 2003. ,
DOI : 10.1109/LICS.2003.1210066
URL : https://hal.archives-ouvertes.fr/inria-00071889
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents, Proceedings of the Foundations of Software Technology and Theoretical Computer Science (FSTTCS'03), 2003. ,
DOI : 10.1007/978-3-540-24597-1_11
URL : https://hal.archives-ouvertes.fr/inria-00103935
A tool for lazy verification of security protocols, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001), 2001. ,
DOI : 10.1109/ASE.2001.989832
URL : https://hal.archives-ouvertes.fr/inria-00107545
A Survey of Authentication Protocol Literature: Version 1.0, 17, 1997. ,
An Improved Constraint-Based System for the Verification of Security Protocols, SAS, pp.326-341, 2002. ,
DOI : 10.1007/3-540-45789-5_24
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
DOI : 10.1109/TIT.1983.1056650
Open issues in formal methods for cryptographic protocol analysis, Proceedings of DISCEX 2000, pp.237-250, 2000. ,
Symbolic protocol analysis with products and Diffie-Hellman exponentiation, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.47-61, 2003. ,
DOI : 10.1109/CSFW.2003.1212704
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.1609
Protocol insecurity with finite number of sessions is NP-complete, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.174-190, 2001. ,
DOI : 10.1109/CSFW.2001.930145
URL : https://hal.archives-ouvertes.fr/inria-00100411