Verification of selected equivalences for security protocols, Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008. ,
Deciding knowledge in security protocols under equational theories, Theoretical Computer Science, vol.367, issue.1-2, pp.2-32, 2006. ,
DOI : 10.1016/j.tcs.2006.08.032
URL : https://hal.archives-ouvertes.fr/inria-00000554
Mobile values, new names, and secure communication, Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages(POPL'01), pp.104-115, 2001. ,
DOI : 10.1145/373243.360213
URL : https://hal.archives-ouvertes.fr/hal-01423924
Combining Algorithms for Deciding Knowledge in Security Protocols, Proceedings of the 6th International Symposium on Frontiers of Combining Systems (FroCoS'07), pp.103-117, 2007. ,
DOI : 10.1007/978-3-540-74621-8_7
URL : https://hal.archives-ouvertes.fr/inria-00129418
Deciding security of protocols against off-line guessing attacks, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.16-25, 2005. ,
DOI : 10.1145/1102120.1102125
YAPA, Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), pp.148-163, 2009. ,
DOI : 10.1145/2422085.2422089
URL : https://hal.archives-ouvertes.fr/inria-00426624
Computationally sound implementations of equational theories against passive adversaries, Information and Computation, vol.207, issue.4, pp.496-520, 2009. ,
DOI : 10.1016/j.ic.2008.12.005
URL : https://hal.archives-ouvertes.fr/inria-00426620
Identity-Based Encryption from the Weil Pairing, Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'01), pp.213-229, 2001. ,
DOI : 10.1007/3-540-44647-8_13
Hierarchical combination of intruder theories, Information and Computation, vol.206, issue.2-4, pp.352-377, 2008. ,
DOI : 10.1016/j.ic.2007.07.004
URL : https://hal.archives-ouvertes.fr/inria-00329715
Computing knowledge in security protocols under convergent equational theories, Proceedings of the 22nd International Conference on Automated Deduction (CADE'09), Lecture Notes in Computer Science, pp.355-370, 2009. ,
Inductionless Induction, Handbook of Automated Reasoning, pp.913-962, 2001. ,
DOI : 10.1016/B978-044450813-3/50016-3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.5750
Analysing Password Protocol Security Against Off-line Dictionary Attacks, Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, pp.47-63, 2004. ,
DOI : 10.1016/j.entcs.2004.10.007
URL : http://doi.org/10.1016/j.entcs.2004.10.007
A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security, vol.14, issue.1, pp.1-43, 2006. ,
DOI : 10.3233/JCS-2006-14101
URL : https://hal.archives-ouvertes.fr/inria-00000552
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
DOI : 10.1109/TIT.1983.1056650
A one round protocol for tripartite Diffie-Hellman, Proceedings of the 4th International Symposium on Algorithmic Number Theory(ANTS-IV), volume 1838 of Lecture Notes in Computer Science, pp.385-394, 2000. ,
Adaptive Soundness of Static Equivalence, Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS'07), pp.610-625, 2007. ,
DOI : 10.1007/978-3-540-74835-9_40
Computationally sound analysis of protocols using bilinear pairings, Journal of Computer Security, vol.18, issue.6, 2009. ,
DOI : 10.3233/JCS-2009-0388
Reducing Equational Theories for the Decision of Static Equivalence, Proceedings of the 13th Asian Computing Science Conference, pp.94-108, 2009. ,
DOI : 10.1007/978-3-642-10622-4_8
URL : https://hal.archives-ouvertes.fr/hal-00495976