Intruder deduction for the equational theory of abelian groups with distributive encryption
From MaRDI portal
Publication:876047
DOI10.1016/J.IC.2006.10.008zbMath1112.68048OpenAlexW1992375708WikidataQ122918742 ScholiaQ122918742MaRDI QIDQ876047
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
Publication date: 16 April 2007
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2006.10.008
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Specification and verification (program logics, model checking, etc.) (68Q60)
Related Items (7)
Computing knowledge in security protocols under convergent equational theories ⋮ Unification modulo homomorphic encryption ⋮ Decidability and combination results for two notions of knowledge in security protocols ⋮ Computing Knowledge in Security Protocols under Convergent Equational Theories ⋮ A Proof Theoretic Analysis of Intruder Theories ⋮ Unification Modulo Homomorphic Encryption ⋮ Easy intruder deduction problems with homomorphisms
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An attack on the Needham-Schroeder public-key authentication protocol
- On the regular structure of prefix rewriting
- An undecidability result for AGh
- Easy intruder deduction problems with homomorphisms
- A calculus for cryptographic protocols: The spi calculus
- The CL-Atse Protocol Analyser
- Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or
- On the security of public key protocols
- FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
- Automatic recognition of tractability in inference relations
- Verification: Theory and Practice
- Foundations of Software Science and Computation Structures
- Automata, Languages and Programming
- Term Rewriting and Applications
- Automata, Languages and Programming
This page was built for publication: Intruder deduction for the equational theory of abelian groups with distributive encryption