Maude-NPA, Version 2.0 (November 26th, 2011)

[1]  Catherine A. Meadows,et al.  Sound Approximations to Diffie-Hellman Using Rewrite Rules , 2004, ICICS.

[2]  José Meseguer,et al.  Variant Narrowing and Equational Unification , 2009, WRLA.

[3]  José Meseguer,et al.  Folding variant narrowing and optimal variant termination , 2010, J. Log. Algebraic Methods Program..

[4]  José Meseguer,et al.  A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties , 2006, Theor. Comput. Sci..

[5]  José Meseguer,et al.  Effectively Checking the Finite Variant Property , 2008, RTA.

[6]  Catherine A. Meadows,et al.  On the Relative Soundness of the Free Algebra Model for Public Key Encryption , 2005, ARSPA@IJCAR.

[7]  Claude Kirchner,et al.  Incremental Construction of Unification Algorithms in Equational Theories , 1983, ICALP.

[8]  Jean-Marie Hullot,et al.  Canonical Forms and Unification , 1980, CADE.

[9]  Stéphanie Delaune,et al.  The Finite Variant Property: How to Get Rid of Some Algebraic Properties , 2005, RTA.

[10]  María Alpuente,et al.  Termination of narrowing revisited , 2009, Theor. Comput. Sci..

[11]  Francisco Durán,et al.  Variants, Unification, Narrowing, and Symbolic Reachability in Maude 2.6 , 2011, RTA.

[12]  José Meseguer,et al.  Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer , 2007, Electron. Notes Theor. Comput. Sci..

[13]  Narciso Martí-Oliet,et al.  All About Maude - A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Rewriting Logic , 2007, All About Maude.

[14]  José Meseguer,et al.  Diffie-Hellman Cryptographic Reasoning in the Maude-NRL Protocol Analyzer , 2006 .

[15]  Michaël Rusinowitch,et al.  Unification Modulo ACUI Plus Distributivity Axioms , 2004, Journal of Automated Reasoning.

[16]  Michaël Rusinowitch,et al.  Cap unification: application to protocol security modulo homomorphic encryption , 2010, ASIACCS '10.

[17]  Catherine A. Meadows,et al.  Formal characterization and automated analysis of known-pair and chosen-text attacks , 2000, IEEE Journal on Selected Areas in Communications.

[18]  José Meseguer,et al.  Protocol analysis in Maude-NPA using unification modulo homomorphic encryption , 2011, PPDP.

[19]  Nachum Dershowitz,et al.  Decidable Matching for Convergent Systems (Preliminary Version) , 1992, CADE.

[20]  Jonathan K. Millen,et al.  On the freedom of decryption , 2003, Inf. Process. Lett..

[21]  José Meseguer,et al.  Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA , 2010, STM.

[22]  Franz Baader,et al.  Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures , 1992, CADE.

[23]  Catherine A. Meadows,et al.  Language generation and verification in the NRL protocol analyzer , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[24]  José Meseguer,et al.  Order-sorted Equational Unification Revisited , 2012, Electron. Notes Theor. Comput. Sci..

[25]  José Meseguer,et al.  Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties , 2009, FOSAD.