An NP decision procedure for protocol insecurity with XOR

From MaRDI portal
Revision as of 06:58, 30 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:557799

DOI10.1016/J.TCS.2005.01.015zbMath1068.68057OpenAlexW2013689938MaRDI QIDQ557799

Michaël Rusinowitch, Mathieu Turuani, Ralf Küsters, Yannick Chevalier

Publication date: 30 June 2005

Published in: Theoretical Computer Science (Search for Journal in Brave)

Full work available at URL: https://hal.inria.fr/inria-00071889




Related Items (27)

Deciding knowledge in security protocols under equational theoriesOn the semantics of Alice \& Bob specifications of security protocolsA rewriting-based inference system for the NRL protocol analyzer and its meta-logical propertiesSymbolic reachability analysis using narrowing and its application to verification of cryptographic protocolsDecidability and combination results for two notions of knowledge in security protocolsBounded memory Dolev-Yao adversaries in collaborative systemsChallenges in the Automated Verification of Security ProtocolsComputing knowledge in equational extensions of subterm convergent theoriesEfficient representation of the attacker's knowledge in cryptographic protocols analysisSatisfiability of general intruder constraints with and without a set constructorIntruder deduction problem for locally stable theories with normal forms and inversesSymbolic protocol analysis for monoidal equational theoriesAbstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automaticallyReducing protocol analysis with XOR to the XOR-free case in the Horn theory based approachAn NP decision procedure for protocol insecurity with XORA method for symbolic analysis of security protocolsUnnamed ItemOn Simulatability Soundness and Mapping Soundness of Symbolic CryptographyA Proof Theoretic Analysis of Intruder TheoriesVerification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid VariablesFlat and One-Variable Clauses for Single Blind Copying Protocols: The XOR CaseProtocol Security and Algebraic Properties: Decision Results for a Bounded Number of SessionsYAPA: A Generic Tool for Computing Intruder KnowledgeDeciding knowledge in security protocols under some e-voting theoriesAutomatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifBounded memory protocolsLimits of the Cryptographic Realization of Dolev-Yao-Style XOR




Cites Work




This page was built for publication: An NP decision procedure for protocol insecurity with XOR