Barthe G, Fan X, Gancher J, Grégoire B, Jacomme C and Shi E. Symbolic Proofs for Lattice-Based Cryptography. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. (538-555).
Avanesov T, Chevalier Y, Rusinowitch M and Turuani M.
(2017). Satisfiability of general intruder constraints with and without a set constructor. Journal of Symbolic Computation. 80:P1. (27-61). Online publication date: 1-May-2017.
Cortier V and Delaune S.
(2012). Decidability and Combination Results for Two Notions of Knowledge in Security Protocols. Journal of Automated Reasoning. 48:4. (441-487). Online publication date: 1-Apr-2012.
Anantharaman S, Bouchard C, Narendran P and Rusinowitch M. Unification modulo chaining. Proceedings of the 6th international conference on Language and Automata Theory and Applications. (70-82).
Escobar S, Kapur D, Lynch C, Meadows C, Meseguer J, Narendran P and Sasse R. Protocol analysis in Maude-NPA using unification modulo homomorphic encryption. Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming. (65-76).
Küsters R and Truderung T.
(2011). Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach. Journal of Automated Reasoning. 46:3-4. (325-352). Online publication date: 1-Apr-2011.
Li Z and Wang W. Rethinking about guessing attacks. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. (316-325).
Li Z and Wang W. Deciding recognizability under Dolev-Yao intruder model. Proceedings of the 13th international conference on Information security. (416-429).
Conchinha B, Basin D and Caleiro C. Efficient decision procedures for message deducibility and static equivalence. Proceedings of the 7th International conference on Formal aspects of security and trust. (34-49).
Kanovich M, Kirigin T, Nigam V and Scedrov A. Bounded memory Dolev-Yao adversaries in collaborative systems. Proceedings of the 7th International conference on Formal aspects of security and trust. (18-33).
Baskar A, Ramanujam R and Suresh S. A DEXPTIME-complete Dolev-Yao theory with distributive encryption. Proceedings of the 35th international conference on Mathematical foundations of computer science. (102-113).
Comon-Lundh H, Cortier V and Zălinescu E.
(2010). Deciding security properties for cryptographic protocols. application to key cycles. ACM Transactions on Computational Logic. 11:2. (1-42). Online publication date: 1-Jan-2010.
Blanchet B.
(2009). Automatic verification of correspondences for security protocols. Journal of Computer Security. 17:4. (363-434). Online publication date: 1-Dec-2009.
Cortier V and Delaune S.
(2009). Safely composing security protocols. Formal Methods in System Design. 34:1. (1-36). Online publication date: 1-Feb-2009.
Küsters R and Truderung T. Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. Proceedings of the 15th ACM conference on Computer and communications security. (129-138).
Kremer S, Mercier A and Treinen R. Proving Group Protocols Secure Against Eavesdroppers. Proceedings of the 4th international joint conference on Automated Reasoning. (116-131).
Chevalier Y, Küsters R, Rusinowitch M and Turuani M.
(2008). Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ACM Transactions on Computational Logic. 9:4. (1-52). Online publication date: 1-Aug-2008.
Delaune S, Lafourcade P, Lugiez D and Treinen R.
(2008). Symbolic protocol analysis for monoidal equational theories. Information and Computation. 206:2-4. (312-351). Online publication date: 1-Feb-2008.
Chevalier Y and Rusinowitch M.
(2008). Hierarchical combination of intruder theories. Information and Computation. 206:2-4. (352-377). Online publication date: 1-Feb-2008.
Cortier V, Delaitre J and Delaune S. Safely composing security protocols. Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science. (352-363).
Delaune S, Lin H and Lynch C. Protocol verification via rigid/flexible resolution. Proceedings of the 14th international conference on Logic for programming, artificial intelligence and reasoning. (242-256).
Cortier V and Delaune S. Deciding knowledge in security protocols for monoidal equational theories. Proceedings of the 14th international conference on Logic for programming, artificial intelligence and reasoning. (196-210).
Delaune S, Lin H and Lynch C. Protocol Verification Via Rigid/Flexible Resolution. Logic for Programming, Artificial Intelligence, and Reasoning. (242-256).
Cortier V and Delaune S. Deciding Knowledge in Security Protocols for Monoidal Equational Theories. Logic for Programming, Artificial Intelligence, and Reasoning. (196-210).
Arnaud M, Cortier V and Delaune S. Combining Algorithms for Deciding Knowledge in Security Protocols. Proceedings of the 6th international symposium on Frontiers of Combining Systems. (103-117).
Lafourcade P.
(2007). Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption. Electronic Notes in Theoretical Computer Science (ENTCS). 171:4. (37-57). Online publication date: 1-Jul-2007.
Meseguer J and Thati P.
(2007). Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Higher-Order and Symbolic Computation. 20:1-2. (123-160). Online publication date: 1-Jun-2007.
Lafourcade P, Lugiez D and Treinen R.
(2007). Intruder deduction for the equational theory of Abelian groups with distributive encryption. Information and Computation. 205:4. (581-623). Online publication date: 1-Apr-2007.
Cortier V, Keighren G and Steel G. Automatic analysis of the security of XOR-based key management schemes. Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems. (538-552).
Küsters R and Truderung T. On the automatic analysis of recursive security protocols with XOR. Proceedings of the 24th annual conference on Theoretical aspects of computer science. (646-657).
Bursuc S, Comon-Lundh H and Delaune S. Associative-commutative deducibility constraints. Proceedings of the 24th annual conference on Theoretical aspects of computer science. (634-645).
Cortier V, Kremer S, Küsters R and Warinschi B. Computationally sound symbolic secrecy in the presence of hash functions. Proceedings of the 26th international conference on Foundations of Software Technology and Theoretical Computer Science. (176-187).
Chevalier Y and Rusinowitch M. Hierarchical combination of intruder theories. Proceedings of the 17th international conference on Term Rewriting and Applications. (108-122).
Delaune S, Lafourcade P, Lugiez D and Treinen R. Symbolic protocol analysis in presence of a homomorphism operator and exclusive or. Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II. (132-143).
Cortier V, Delaune S and Lafourcade P.
(2006). A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security. 14:1. (1-43). Online publication date: 1-Jan-2006.
Escobar S, Meadows C and Meseguer J. A rewriting-based inference system for the NRL protocol analyzer. Proceedings of the 2005 ACM workshop on Formal methods in security engineering. (1-12).
Backes M and Pfitzmann B. Limits of the cryptographic realization of dolev-yao-style XOR. Proceedings of the 10th European conference on Research in Computer Security. (178-196).
Chevalier Y and Rusinowitch M. Combining intruder theories. Proceedings of the 32nd international conference on Automata, Languages and Programming. (639-651).
Boreale M and Buscemi M.
(2005). A method for symbolic analysis of security protocols. Theoretical Computer Science. 338:1-3. (393-425). Online publication date: 10-Jun-2005.
Chevalier Y, Küsters R, Rusinowitch M and Turuani M.
(2005). An NP decision procedure for protocol insecurity with XOR. Theoretical Computer Science. 338:1-3. (247-274). Online publication date: 10-Jun-2005.
Millen J and Shmatikov V.
(2005). Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security. 13:3. (515-564). Online publication date: 1-May-2005.
Lafourcade P, Lugiez D and Treinen R. Intruder deduction for AC-like equational theories with homomorphisms. Proceedings of the 16th international conference on Term Rewriting and Applications. (308-322).
Comon-Lundh H and Delaune S. The finite variant property. Proceedings of the 16th international conference on Term Rewriting and Applications. (294-307).
Chevalier Y, Küsters R, Rusinowitch M and Turuani M.
(2005). Deciding the Security of Protocols with Commuting Public Key Encryption. Electronic Notes in Theoretical Computer Science (ENTCS). 125:1. (55-66). Online publication date: 1-Mar-2005.
Meseguer J and Thati P.
(2005). Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols. Electronic Notes in Theoretical Computer Science (ENTCS). 117:C. (153-182). Online publication date: 20-Jan-2005.
Delaune S and Jacquemard F. A decision procedure for the verification of security protocols with explicit destructors. Proceedings of the 11th ACM conference on Computer and communications security. (278-287).
Backes M, Meadows C and Mitchell J. Relating cryptography and formal methods. Proceedings of the 2003 ACM workshop on Formal methods in security engineering. (61-66).
Comon-Lundh H and Cortier V. New decidability results for fragments of first-order logic and application to cryptographic protocols. Proceedings of the 14th international conference on Rewriting techniques and applications. (148-164).