30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

206 BIBLIOGRAPHY<br />

[60] U. Hustadt Ch. G. Fermüller, A. Leitsch <strong>and</strong> T. Tammet. Resolution decision<br />

procedures. In H<strong>and</strong>book <strong>of</strong> Automated Reasoning, pages 1791–1849.<br />

2001.<br />

[61] D. Chaum. Blind signatures for untraceable payments. In CRYPTO, pages<br />

199–203, 1982.<br />

[62] D. Chaum. Elections with unconditionally-secret ballots <strong>and</strong> disruption<br />

equivalent to breaking rsa. In EUROCRYPT, pages 177–182, 1988.<br />

[63] D. Chaum. Secret-ballot receipts: True voter-verifiable elections. IEEE<br />

Security & Privacy, 2(1):38–47, 2004.<br />

[64] D. Chaum, C. Crépeau, <strong>and</strong> I. Damg˚ard. Multiparty unconditionally secure<br />

protocols (extended abstract). In STOC, pages 11–19. ACM, 1988.<br />

[65] D. Chaum, P. Y. A. Ryan, <strong>and</strong> S. A. Schneider. A practical voter-verifiable<br />

election scheme. In S. De Capitani di Vimercati, P. F. Syverson, <strong>and</strong><br />

D. Gollmann, editors, ESORICS, volume 3679 <strong>of</strong> Lecture Notes in Computer<br />

Science, pages 118–139. Springer, 2005.<br />

[66] Y. Chevalier <strong>and</strong> M. Kourjieh. Key substitution in the symbolic analysis<br />

<strong>of</strong> cryptographic protocols. In V. Arvind <strong>and</strong> S. Prasad, editors, FSTTCS,<br />

volume 4855 <strong>of</strong> Lecture Notes in Computer Science, pages 121–132. Springer,<br />

2007.<br />

[67] Y. Chevalier <strong>and</strong> M. Kourjieh. A symbolic intruder model for hashcollision<br />

attacks. In M. Okada <strong>and</strong> I. Satoh editors, ASIAN, volume 4435 <strong>of</strong><br />

Lecture Notes in Computer Science, pages 13–27, Springer, 2006.<br />

[68] Y. Chevalier, R. Küsters, M. Rusinowitch, <strong>and</strong> M. Turuani. Deciding the<br />

security <strong>of</strong> protocols with diffie-hellman exponentiation <strong>and</strong> products in<br />

exponents. In P<strong>and</strong>ya <strong>and</strong> Radhakrishnan [166], pages 124–135.<br />

[69] Y. Chevalier, R. Küsters, M. Rusinowitch, <strong>and</strong> M. Turuani. Deciding the<br />

security <strong>of</strong> protocols with commuting public key encryption. Electr. Notes<br />

Theor. Comput. Sci., 125(1):55–66, 2005.<br />

[70] Y. Chevalier, R. Küsters, M. Rusinowitch, <strong>and</strong> M. Turuani. An np decision<br />

procedure for protocol insecurity with xor. Theor. Comput. Sci., 338(1-<br />

3):247–274, 2005.<br />

[71] Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, <strong>and</strong> L. Vigneron.<br />

Extending the dolev-yao intruder for analyzing an unbounded number<br />

<strong>of</strong> sessions. In M. Baaz <strong>and</strong> J. A. Makowsky, editors, CSL, volume 2803 <strong>of</strong><br />

Lecture Notes in Computer Science, pages 128–141. Springer, 2003.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!