Guessing Attacks and the Computational Soundness of Static Equivalence, Foundations of Software Science and Computation Structure (FoSSaCS'06), pp.398-412, 2006. ,
DOI : 10.1007/11690634_27
Deciding Knowledge in Security Protocols under (Many More) Equational Theories, 18th IEEE Computer Security Foundations Workshop (CSFW'05), pp.62-76, 2005. ,
DOI : 10.1109/CSFW.2005.14
URL : https://hal.archives-ouvertes.fr/inria-00000554
Mobile values, new names, and secure communication, Principles of Program-ming Languages (POPL'01), pp.104-115, 2001. ,
DOI : 10.1145/373243.360213
URL : https://hal.archives-ouvertes.fr/hal-01423924
A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, 1999. ,
DOI : 10.1145/266420.266432
Reconciling two views of cryptography: the computational soundness of formal encryption, Int. Conf. on Theoretical Computer Science, 2000. ,
On the Minimal Assumptions of Group Signature Schemes, 6th International Conference on Information and Communication Security, pp.1-13, 2004. ,
DOI : 10.1007/978-3-540-30191-2_1
Cryptographically Sound Implementations for Communicating Processes, International Colloquium on Algorithms, Languages and Programming (ICALP'06), 2006. ,
DOI : 10.1007/11787006_8
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography, Foundations of Software Technology and Theoretical Computer Science (FSTTCS), 2007. ,
DOI : 10.1007/978-3-540-77050-3_9
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 2004. ,
DOI : 10.1109/CSFW.2004.1310742
Relating cryptographic und symbolic key secrecy, Symp. on Security and Privacy (SSP'05), pp.171-182, 2005. ,
DOI : 10.1109/sp.2005.17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.8373
A com-posable cryptographic library with nested operations, 10th ACM Concerence on Computer and Communications Security (CCS'03), 2003. ,
The reactive simulatability (RSIM) framework for asynchronous systems, Information and Computation, vol.205, issue.12, pp.1685-1720, 2007. ,
DOI : 10.1016/j.ic.2007.05.002
Soundness and completeness of formal logics of symmetric encryption, Cryptology ePrint Archive Report, vol.101, 2005. ,
Computationally sound implementations of equational theories against passive adversaries, Int. Colloquium on Automata, Languages and Programming (ICALP'05), 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00426620
Authenticated encryption: relations among notions and analysis of the generic composition paradigm, Advances in Cryptology, pp.531-545, 1976. ,
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930138
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5150
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008. ,
DOI : 10.1109/LICS.2005.8
A logic of authentication, 1989. ,
Universal composable security: a new paradigm for cryptographic protocols, Symposium on Foundations of Computer Science, 2001. ,
Universally composable symbolic analysis of cryptographic protocols, Theory of Cryptography Conference (TCC'06), 2006. ,
Universal Composition with Joint State, Cryptology ePrint Archive, vol.47, 2002. ,
DOI : 10.1007/978-3-540-45146-4_16
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions, Fundations of Software Technology and Theoretical Computer Science (FSTTCS'06), pp.176-187, 2006. ,
DOI : 10.1007/11944836_18
URL : https://hal.archives-ouvertes.fr/inria-00108386
Computationally Sound, Automated Proofs for Security Protocols, European Symposium on Programming (ESOP'05), pp.157-171, 2005. ,
DOI : 10.1007/978-3-540-31987-0_12
URL : https://hal.archives-ouvertes.fr/inria-00000556
Coercion-Resistance and Receipt-Freeness in Electronic Voting, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.28-39, 2006. ,
DOI : 10.1109/CSFW.2006.8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.218.4709
Symbolic bisimulation for the applied pi-calculus, Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), pp.133-145, 2007. ,
Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries, European Symposium on Programming (ESOP'05), pp.172-185, 2005. ,
DOI : 10.1007/978-3-540-31987-0_13
(de)compositions of cryptographic schemes and their applications to protocols, Cryptology ePrint Archive, 2005. ,
Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions, Workshop on Information and Computer Security (ICS'06), 2006. ,
DOI : 10.1016/j.entcs.2007.01.066
Security of blind digital signatures, advances in cryptology, pp.150-164, 1997. ,
DOI : 10.1007/BFb0052233
Adaptive Soundness of Static Equivalence, European Symposium on Research in Computer Security (ESORICS'07), pp.610-625, 2007. ,
DOI : 10.1007/978-3-540-74835-9_40
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation, 2008 21st IEEE Computer Security Foundations Symposium, 2008. ,
DOI : 10.1109/CSF.2008.18
Symmetric encryption in automatic analyses for confidentiality against active adversaries, Symp. on Security and Privacy, pp.71-85, 2004. ,
Completeness theorems for the Abadi-Rogaway language of encrypted expressions, Journal of Computer Security, 2004. ,
Soundness of formal encryption in presence of an active attacker, Theory of Cryptography Conference, 2004. ,
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols, Theoretical Computer Science, vol.353, issue.1-3, pp.118-164, 2006. ,
DOI : 10.1016/j.tcs.2005.10.044
Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès ,
Domaine Universitaire -351, cours de la Libération -33405 Talence Cedex Centre de recherche INRIA Grenoble ? Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier Centre de recherche INRIA Lille ? Nord Europe : Parc Scientifique de la Haute Borne -40, avenue Halley -59650 Villeneuve d'Ascq Centre de recherche INRIA Paris ? Rocquencourt : Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex Centre de recherche INRIA Rennes ? Bretagne Atlantique : IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex Centre de recherche INRIA Saclay ? Île-de-France, des Vignes : 4, rue Jacques Monod -91893 Orsay Cedex Centre de recherche INRIA, pp.93-06902, 2004. ,