A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, 1997. ,
DOI : 10.1145/266420.266432
On name generation and setbased analysis in the Dolev-Yao model, Proceedings of the 13th International Conference on Concurrency Theory (CONCUR), 2002. ,
On the Reachability Problem in Cryptographic Protocols, Proceedings of the 12th International Conference on Concurrency Theory (CONCUR), 2000. ,
DOI : 10.1007/3-540-44618-4_28
URL : https://hal.archives-ouvertes.fr/inria-00072738
Authenticated Key Exchange Secure against Dictionary Attacks, Proceedings of Advances in Cryptology (EUROCRYPT), 2000. ,
DOI : 10.1007/3-540-45539-6_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.5384
Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992. ,
DOI : 10.1109/RISP.1992.213269
URL : http://academiccommons.columbia.edu/download/fedora_content/download/ac:127104/CONTENT/neke.pdf
An NP decision procedure for protocol insecurity with XOR, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., 2003. ,
DOI : 10.1109/LICS.2003.1210066
URL : https://hal.archives-ouvertes.fr/inria-00103954
Tree automata with one memory set constraints and cryptographic protocols, Theoretical Computer Science, 2003. ,
DOI : 10.1016/j.tcs.2004.09.036
URL : https://hal.archives-ouvertes.fr/inria-00000553
Constraint solving, exclusive or and the decision of confidentiality for security protocols assuming a bounded number of sessions, Proceedings of Logic in Computer Science (LICS), 2003. ,
Guess what? Here is a new tool that finds some new guessing attacks, Proceedings of the Workshop on Issues in the Theory of Security (WITS), 2003. ,
A theory of guessing attacks and its complexity. Research Report LSV-04-1, Lab. Specification and Verification, 2004. ,
Undetectable on-line password guessing attacks, ACM SIGOPS Operating Systems Review, vol.29, issue.4, 1995. ,
DOI : 10.1145/219282.219298
Undecidability of bounded security protocols, Proceedings of Workshop on Formal Methods and Security Protocols, 1999. ,
On the security of public key protocols, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), 1983. ,
DOI : 10.1109/SFCS.1981.32
Probabilistic encryption, Journal of Computer and System Sciences, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : http://doi.org/10.1016/0022-0000(84)90070-9
Protecting poorly chosen secrets from guessing attacks, IEEE Journal on Selected Areas in Communications, vol.11, issue.5, 1993. ,
DOI : 10.1109/49.223865
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.208.5305
Solving equations in abstract algebras: a rule-based survey of unification, Computational Logic. Essays in honor of Alan Robinson, 1991. ,
Yung Efficient passwordauthenticated key exchange using human-memorable passwords, Proceedings of Advances in Cryptology (EURO- CRYPT), 2001. ,
DOI : 10.1007/3-540-44987-6_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.9319
Analysing protocols subject to guessing attacks, Proceedings of the Workshop on Issues in the Theory of Security (WITS), 2002. ,
DOI : 10.3233/JCS-2004-12104
Automatic recognition of tractability in inference relations, Journal of the ACM, vol.40, issue.2, 1993. ,
DOI : 10.1145/151261.151265
Constraint solving for boundedprocess cryptographic protocol analysis, Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS), 2001. ,
DOI : 10.1145/501983.502007
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.3643
Protocol insecurity with finite number of sessions is NP-complete, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930145
URL : https://hal.archives-ouvertes.fr/inria-00100411
Kerberos: An authentication service for open network systems, Proceedings of the Winter 1988 Usenix Conference, 1988. ,
Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks, Proceedings of 1993 IEEE 12th Symposium on Reliable Distributed Systems, 1993. ,
DOI : 10.1109/RELDIS.1993.393465
The secure remote password protocol, Proceedings of the Internet Society Network and Distributed System Security Symposium, 1998. ,