An NP decision procedure for protocol insecurity with XOR, Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), pp.261-270, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00103807
Combining Intruder Theories, Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), pp.639-651, 2005. ,
DOI : 10.1007/11523468_52
URL : https://hal.archives-ouvertes.fr/inria-00070512
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., pp.271-280, 2003. ,
DOI : 10.1109/LICS.2003.1210067
A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security, vol.14, issue.1, pp.1-43, 2006. ,
DOI : 10.3233/JCS-2006-14101
URL : https://hal.archives-ouvertes.fr/inria-00000552
A secure and optimally efficient multiauthority election scheme, Proc. International Conference on the Theory and Application of Cryptographic Techniques, pp.103-118, 1997. ,
DOI : 10.1002/ett.4460080506
URL : http://www.win.tue.nl/~berry/papers/euro97.pdf
Easy intruder deduction problems with homomorphisms, Information Processing Letters, vol.97, issue.6, pp.213-218, 2006. ,
DOI : 10.1016/j.ipl.2005.11.008
An undecidability result for AGh, Theoretical Computer Science, vol.368, issue.1-2, 2006. ,
DOI : 10.1016/j.tcs.2006.08.018
URL : https://doi.org/10.1016/j.tcs.2006.08.018
A decision procedure for the verification of security protocols with explicit destructors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.278-287, 2004. ,
DOI : 10.1145/1030083.1030121
URL : https://hal.archives-ouvertes.fr/inria-00579012
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or, 2005. ,
DOI : 10.1007/11787006_12
URL : https://hal.archives-ouvertes.fr/hal-01759947
On the security of public key protocols, Proc. of the 22nd Symp. on Foundations of Computer Science, pp.350-357, 1981. ,
Undecidability of bounded security protocols, Proc. Workshop on formal methods in security protocols, 1999. ,
Complexity of Nilpotent Unification and Matching Problems, Information and Computation, vol.162, issue.1-2, pp.3-23, 2000. ,
DOI : 10.1006/inco.1999.2849
Intruder Deduction for AC-Like Equational Theories with Homomorphisms, Proc. of 16th Int. Conference on Rewriting Techniques and Applications (RTA'05), pp.308-322, 2005. ,
DOI : 10.1007/978-3-540-32033-3_23
Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption, Electronic Notes in Theoretical Computer Science, vol.171, issue.4, 2005. ,
DOI : 10.1016/j.entcs.2007.02.054
Constraint solving for bounded-process cryptographic protocol analysis, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, 2001. ,
DOI : 10.1145/501983.502007
URL : http://www.cs.utexas.edu/~shmat/shmat_ccs01.pdf
Symbolic protocol analysis with an Abelian group operator or Diffie???Hellman exponentiation, Journal of Computer Security, vol.13, issue.3, pp.515-564, 2005. ,
DOI : 10.3233/JCS-2005-13306
Protocol insecurity with a finite number of sessions and composed keys is NP-complete, Theoretical Computer Science, vol.299, issue.1-3, pp.1-3451, 2003. ,
DOI : 10.1016/S0304-3975(02)00490-5