Sécurité des protocoles cryptographiques : décidabilité et complexité
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Vitaly Shmatikov,et al. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..
[3] Vitaly Shmatikov,et al. Is it possible to decide whether a cryptographic protocol is secure or not , 2002 .
[4] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[5] Roberto M. Amadio,et al. On the Reachability Problem in Cryptographic Protocols , 2000, CONCUR.
[6] David Monniaux,et al. Abstracting cryptographic protocols with tree automata , 1999, Sci. Comput. Program..
[7] Martín Abadi,et al. Computing symbolic models for verifying cryptographic protocols , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[8] Somesh Jha,et al. Using state space exploration and a natural deduction style message derivation engine to verify security protocols , 1998, PROCOMET.
[9] Vitaly Shmatikov,et al. Finite-State Analysis of SSL 3.0 , 1998, USENIX Security Symposium.
[10] Catherine A. Meadows,et al. The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..
[11] Richard M. Karp,et al. On the Security of Ping-Pong Protocols , 1982, Inf. Control..
[12] Vitaly Shmatikov,et al. Symbolic protocol analysis with products and Diffie-Hellman exponentiation , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[13] Georg Gottlob,et al. Complexity and expressive power of logic programming , 1997, Proceedings of Computational Complexity. Twelfth Annual IEEE Conference.
[14] Birgit Pfitzmann,et al. Symmetric Authentication within a Simulatable Cryptographic Library , 2003, ESORICS.
[15] Jean-Jacques Quisquater,et al. A security analysis of the cliques protocols suites , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[16] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[17] Gavin Lowe,et al. Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[18] Catherine A. Meadows. Open Issues in Formal Methods for Cryptographic Protocol Analysis , 2001, MMM-ACNS.
[19] Ralf Küsters,et al. On the decidability of cryptographic protocols with open-ended data structures , 2002, International Journal of Information Security.
[20] Dominique Bolignano. Towards the formal verification of electronic commerce protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.
[21] Jonathan K. Millen,et al. CAPSL: Common Authentication Protocol Specification Language , 1996, NSPW '96.
[22] Witold Charatonik,et al. On Name Generation and Set-Based Analysis in the Dolev-Yao Model , 2002, CONCUR.
[23] Véronique Cortier,et al. New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols , 2003, RTA.
[24] Catherine A. Meadows. Invariant generation techniques in cryptographic protocol analysis , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[25] Michele Boreale,et al. Symbolic Trace Analysis of Cryptographic Protocols , 2001, ICALP.
[26] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[27] Thomas Genet,et al. Rewriting for Cryptographic Protocol Verification , 2000, CADE.
[28] Gavin Lowe. Casper: a compiler for the analysis of security protocols , 1998 .
[29] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[30] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[31] Steve A. Schneider,et al. Towards automatic verification of authentication protocols on an unbounded network , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[32] Yannick Chevalier,et al. Automated Unbounded Verification of Security Protocols , 2002, CAV.
[33] Yannick Chevalier,et al. An NP decision procedure for protocol insecurity with XOR , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..
[34] John C. Mitchell,et al. A meta-notation for protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[35] Oded Goldreich,et al. On the security of multi-party ping-pong protocols , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[36] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[37] Scott D. Stoller. A bound on attacks on payment protocols , 2001, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science.
[38] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[39] Yannick Chevalier,et al. Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions , 2003, CSL.
[40] Jonathan K. Millen,et al. Proving secrecy is easy enough , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[41] Somesh Jha,et al. Verifying security protocols with Brutus , 2000, TSEM.
[42] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[43] Michaël Rusinowitch,et al. Compiling and Verifying Security Protocols , 2000, LPAR.
[44] Jean-Jacques Quisquater,et al. On the perfect encryption assumption , 2000 .
[45] Ramaswamy Ramanujam,et al. Tagging Makes Secrecy Decidable with Unbounded Nonces as Well , 2003, FSTTCS.
[46] Paul F. Syverson,et al. The Logic of Authentication Protocols , 2000, FOSAD.
[47] Bruno Blanchet,et al. From Secrecy to Authenticity in Security Protocols , 2002, SAS.
[48] Sebastian Mödersheim,et al. The AVISS Security Protocol Analysis Tool , 2002, CAV.
[49] G. Denker,et al. CAPSL integrated protocol environment , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[50] Catherine A. Meadows,et al. Applying Formal Methods to the Analysis of a Key Management Protocol , 1992, J. Comput. Secur..
[51] Michaël Rusinowitch,et al. Protocol insecurity with finite number of sessions is NP-complete , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[52] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[53] Roberto M. Amadio,et al. On the symbolic reduction of processes with cryptographic functions , 2003, Theor. Comput. Sci..
[54] Yannick Chevalier,et al. A tool for lazy verification of security protocols , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).
[55] A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[56] Jonathan K. Millen,et al. Optimizing protocol rewrite rules of CIL specifications , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[57] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[58] Vitaly Shmatikov,et al. Constraint solving for bounded-process cryptographic protocol analysis , 2001, CCS '01.
[59] Birgit Pfitzmann,et al. A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol , 2003, FSTTCS.
[60] Friedrich Otto,et al. String-Rewriting Systems , 1993, Text and Monographs in Computer Science.
[61] Steve A. Schneider. Verifying authentication protocols with CSP , 1997, Proceedings 10th Computer Security Foundations Workshop.
[62] Lawrence C. Paulson,et al. Mechanized proofs for a recursive authentication protocol , 1997, Proceedings 10th Computer Security Foundations Workshop.
[63] Michael J. Maher,et al. Solving Numerical Constraints , 2001, Handbook of Automated Reasoning.
[64] David A. Basin. Lazy Infinite-State Analysis of Security Protocols , 1999, CQRE.
[65] John Mitchell,et al. Tree Automata with One Memory, Set Constraints, and Ping-Pong Protocols , 2001, ICALP.
[66] Peter Y. A. Ryan,et al. An Attack on a Recursive Authentication Protocol. A Cautionary Tale , 1998, Inf. Process. Lett..
[67] I. Borosh,et al. Bounds on positive integral solutions of linear Diophantine equations , 1976 .