| Publication | Date of Publication | Type |
|---|
CryptoSolve: towards a tool for the symbolic analysis of cryptographic algorithms (available as arXiv preprint) | 2024-02-08 | Paper |
| CryptoSolve: towards a tool for the symbolic analysis of cryptographic algorithms | 2024-02-08 | Paper |
| Protocol analysis with time and space | 2022-07-13 | Paper |
Protocol analysis with time (available as arXiv preprint) | 2022-07-06 | Paper |
| Moving the bar on computationally sound exclusive-or | 2022-06-24 | Paper |
| Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystems | 2022-03-24 | Paper |
On asymmetric unification for the theory of XOR with a homomorphism (available as arXiv preprint) | 2020-05-13 | Paper |
Model Checking Security Protocols Handbook of Model Checking | 2018-07-20 | Paper |
| Stealthy protocols: metrics and open problems | 2018-03-26 | Paper |
Security of Ramp Schemes Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 2017-04-10 | Paper |
Bayesian authentication: quantifying security of the Hancke-Kuhn protocol Electronic Notes in Theoretical Computer Science | 2016-07-08 | Paper |
Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories Programming Languages with Applications to Biology and Security | 2016-01-08 | Paper |
Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later Lecture Notes in Computer Science | 2015-09-14 | Paper |
On unification modulo one-sided distributivity: algorithms, variants and asymmetry Logical Methods in Computer Science | 2015-08-25 | Paper |
State space reduction in the Maude-NRL protocol analyzer Information and Computation | 2014-10-20 | Paper |
On Asymmetric Unification and the Combination Problem in Disjoint Theories Lecture Notes in Computer Science | 2014-04-16 | Paper |
| On the relative soundness of the free algebra model for public key encryption | 2013-09-25 | Paper |
Asymmetric unification: a new unification paradigm for cryptographic protocol analysis Automated Deduction – CADE-24 | 2013-06-14 | Paper |
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties Foundations of Security Analysis and Design V | 2009-10-22 | Paper |
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties Theoretical Computer Science | 2007-01-09 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols Science of Computer Programming | 2004-11-22 | Paper |
| scientific article; zbMATH DE number 1962757 (Why is no real title available?) | 2003-08-11 | Paper |
| scientific article; zbMATH DE number 1956542 (Why is no real title available?) | 2003-07-30 | Paper |
| scientific article; zbMATH DE number 1739881 (Why is no real title available?) | 2002-05-13 | Paper |
| scientific article; zbMATH DE number 1113949 (Why is no real title available?) | 1998-06-11 | Paper |
| scientific article; zbMATH DE number 1088926 (Why is no real title available?) | 1997-11-18 | Paper |
| scientific article; zbMATH DE number 1024091 (Why is no real title available?) | 1997-10-20 | Paper |
The NRL Protocol Analyzer: An Overview The Journal of Logic Programming | 1997-04-17 | Paper |
A formal language for cryptographic protocol requirements Designs, Codes and Cryptography | 1996-08-19 | Paper |
Three systems for cryptographic protocol analysis Journal of Cryptology | 1994-08-17 | Paper |
Summing over a network without revealing summands BIT | 1989-01-01 | Paper |
| scientific article; zbMATH DE number 3972788 (Why is no real title available?) | 1985-01-01 | Paper |
Linear systems cut out by quadric on projections of varieties Journal of Algebra | 1984-01-01 | Paper |