Author:
Chevalier Yannick,Küsters Ralf,Rusinowitch Michaël,Turuani Mathieu
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Amadio, R., Lugiez, D., Vanackere, V.: On the symbolic reduction of processes with cryptographic functions. Theoretical Computer Science 290(1), 695–740 (2002)
2. Bockmayr, A., Weispfenning, V.: Solving numerical constraints. In: Robinson, A., Voronkov, A. (eds.) Handbook of Automated Reasoning, ch. 12, vol.1, pp. 751–842. Elsevier Science, Amsterdam (2001)
3. Boreale, M., Buscemi, M.G.: On the symbolic analysis of low-level cryptographic primitives: Modular exponentiation and the Diffie-Hellman protocol. In: Proc. of FCS 2003 (2003)
4. Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. Technical Report 0305, CAU Kiel, Germany (2003), Available from http://www.informatik.uni-kiel.de/reports/2003/0305.html
5. Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: An NP Decision Procedure for Protocol Insecurity with XOR. In: Proc. of LICS 2003 (2003)
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献