An NP decision procedure for protocol insecurity with XOR

From MaRDI portal
Publication:557799

DOI10.1016/j.tcs.2005.01.015zbMath1068.68057OpenAlexW2013689938MaRDI QIDQ557799

Michaël Rusinowitch, Mathieu Turuani, Ralf Küsters, Yannick Chevalier

Publication date: 30 June 2005

Published in: Theoretical Computer Science (Search for Journal in Brave)

Full work available at URL: https://hal.inria.fr/inria-00071889



Related Items

Deciding knowledge in security protocols under equational theories, On the semantics of Alice \& Bob specifications of security protocols, A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties, Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols, Decidability and combination results for two notions of knowledge in security protocols, Bounded memory Dolev-Yao adversaries in collaborative systems, Challenges in the Automated Verification of Security Protocols, Computing knowledge in equational extensions of subterm convergent theories, Efficient representation of the attacker's knowledge in cryptographic protocols analysis, Satisfiability of general intruder constraints with and without a set constructor, Intruder deduction problem for locally stable theories with normal forms and inverses, Symbolic protocol analysis for monoidal equational theories, Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically, Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach, An NP decision procedure for protocol insecurity with XOR, A method for symbolic analysis of security protocols, Unnamed Item, On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography, A Proof Theoretic Analysis of Intruder Theories, Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables, Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case, Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions, YAPA: A Generic Tool for Computing Intruder Knowledge, Deciding knowledge in security protocols under some e-voting theories, Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif, Bounded memory protocols, Limits of the Cryptographic Realization of Dolev-Yao-Style XOR



Cites Work