Automating security analysis: symbolic equivalence of constraint systems
From MaRDI portal
Publication:5747780
DOI10.1007/978-3-642-14203-1_35zbMATH Open1291.94068OpenAlexW1535988411MaRDI QIDQ5747780FDOQ5747780
Authors: Vincent Cheval, Hubert Comon-Lundh, Stéphanie Delaune
Publication date: 14 September 2010
Published in: Automated Reasoning (Search for Journal in Brave)
Full work available at URL: https://kar.kent.ac.uk/46730/1/CCD-ijcar10.pdf
Recommendations
- A procedure for deciding symbolic equivalence between sets of constraint systems
- Deciding equivalence-based properties using constraint solving
- scientific article; zbMATH DE number 1754628
- Universally composable symbolic security analysis
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
Cites Work
- YAPA: A Generic Tool for Computing Intruder Knowledge
- The NRL Protocol Analyzer: An Overview
- Mobile values, new names, and secure communication
- Automated verification of selected equivalences for security protocols
- Decidability of equivalence of symbolic derivations
- Deciding knowledge in security protocols under equational theories
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- Analysing password protocol security against off-line dictionary attacks
- Automating security analysis: symbolic equivalence of constraint systems
- Deciding security properties for cryptographic protocols. application to key cycles
- Title not available (Why is that?)
- Deciding framed bisimilarity
- Modal logics for cryptographic processes
- Challenges in the Automated Verification of Security Protocols
Cited In (14)
- Deciding equivalence-based properties using constraint solving
- Decidability of equivalence of symbolic derivations
- DeepSec: deciding equivalence properties for security protocols -- improved theory and practice
- CONCUR 2005 – Concurrency Theory
- On Communication Models When Verifying Equivalence Properties
- A procedure for deciding symbolic equivalence between sets of constraint systems
- Automating security analysis: symbolic equivalence of constraint systems
- A reduced semantics for deciding trace equivalence
- Automated verification of equivalence properties of cryptographic protocols
- POR for security protocol equivalences. Beyond action-determinism
- Stateful applied pi calculus: observational equivalence and labelled bisimilarity
- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
- FAST: an efficient decision procedure for deduction and static equivalence
Uses Software
This page was built for publication: Automating security analysis: symbolic equivalence of constraint systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5747780)