Attacks on Cryptoprocessor Transaction Sets, Proceedings of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES'01), pp.220-234, 2001. ,
DOI : 10.1007/3-540-44709-1_19
An NP decision procedure for protocol insecurity with XOR, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., 2003. ,
DOI : 10.1109/LICS.2003.1210066
URL : https://hal.archives-ouvertes.fr/inria-00103954
Experience Using a Low-Cost FPGA Design to Crack DES Keys, Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded System (CHES'02), pp.579-592, 2003. ,
DOI : 10.1007/3-540-36400-5_42
On the Security of PKCS #11, Proceedings of the 5th International Worshop on Cryptographic Hardware and Embedded Systems (CHES'03), pp.411-425, 2003. ,
DOI : 10.1007/978-3-540-45238-6_32
New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols, Proceedings of the 14th International Conference on Rewriting Techniques and Applications (RTA'2003), pp.148-164, 2003. ,
DOI : 10.1007/3-540-44881-0_12
The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), pp.294-307, 2005. ,
DOI : 10.1007/978-3-540-32033-3_22
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., pp.271-280, 2003. ,
DOI : 10.1109/LICS.2003.1210067
Automatic analysis of the security of xorbased key management schemes, Proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'07), pp.538-552, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00181616
Defending the bank with a proof assistant, Proceedings of Workshop on Issues in the Theory of Security (WITS '06), 2006. ,
Rewrite Systems, Handbook of Theoretical Computer Science, 1990. ,
DOI : 10.1016/B978-0-444-88074-1.50011-1
On the security of public key protocols, IEEE Transactions in Information Theory, vol.2, issue.29, pp.198-208, 1983. ,
Model checking IBM's common cryptographic architecture API, 2006. ,
Deduction with XOR Constraints in Security API Modelling, Proceedings of the 20th International Conference on Automated Deduction (CADE'05), pp.322-336, 2005. ,
DOI : 10.1007/11532231_24
On the Complexity of Equational Horn Clauses, Proceedings of the 20th International Conference on Automated Deduction, pp.337-352, 2005. ,
DOI : 10.1007/11532231_25
Robbing the Bank with a Theorem Prover, 2005. ,
DOI : 10.1007/978-3-642-17773-6_21