Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
206 BIBLIOGRAPHY<br />
[60] U. Hustadt Ch. G. Fermüller, A. Leitsch <strong>and</strong> T. Tammet. Resolution decision<br />
procedures. In H<strong>and</strong>book <strong>of</strong> Automated Reasoning, pages 1791–1849.<br />
2001.<br />
[61] D. Chaum. Blind signatures for untraceable payments. In CRYPTO, pages<br />
199–203, 1982.<br />
[62] D. Chaum. Elections with unconditionally-secret ballots <strong>and</strong> disruption<br />
equivalent to breaking rsa. In EUROCRYPT, pages 177–182, 1988.<br />
[63] D. Chaum. Secret-ballot receipts: True voter-verifiable elections. IEEE<br />
Security & Privacy, 2(1):38–47, 2004.<br />
[64] D. Chaum, C. Crépeau, <strong>and</strong> I. Damg˚ard. Multiparty unconditionally secure<br />
protocols (extended abstract). In STOC, pages 11–19. ACM, 1988.<br />
[65] D. Chaum, P. Y. A. Ryan, <strong>and</strong> S. A. Schneider. A practical voter-verifiable<br />
election scheme. In S. De Capitani di Vimercati, P. F. Syverson, <strong>and</strong><br />
D. Gollmann, editors, ESORICS, volume 3679 <strong>of</strong> Lecture Notes in Computer<br />
Science, pages 118–139. Springer, 2005.<br />
[66] Y. Chevalier <strong>and</strong> M. Kourjieh. Key substitution in the symbolic analysis<br />
<strong>of</strong> cryptographic protocols. In V. Arvind <strong>and</strong> S. Prasad, editors, FSTTCS,<br />
volume 4855 <strong>of</strong> Lecture Notes in Computer Science, pages 121–132. Springer,<br />
2007.<br />
[67] Y. Chevalier <strong>and</strong> M. Kourjieh. A symbolic intruder model for hashcollision<br />
attacks. In M. Okada <strong>and</strong> I. Satoh editors, ASIAN, volume 4435 <strong>of</strong><br />
Lecture Notes in Computer Science, pages 13–27, Springer, 2006.<br />
[68] Y. Chevalier, R. Küsters, M. Rusinowitch, <strong>and</strong> M. Turuani. Deciding the<br />
security <strong>of</strong> protocols with diffie-hellman exponentiation <strong>and</strong> products in<br />
exponents. In P<strong>and</strong>ya <strong>and</strong> Radhakrishnan [166], pages 124–135.<br />
[69] Y. Chevalier, R. Küsters, M. Rusinowitch, <strong>and</strong> M. Turuani. Deciding the<br />
security <strong>of</strong> protocols with commuting public key encryption. Electr. Notes<br />
Theor. Comput. Sci., 125(1):55–66, 2005.<br />
[70] Y. Chevalier, R. Küsters, M. Rusinowitch, <strong>and</strong> M. Turuani. An np decision<br />
procedure for protocol insecurity with xor. Theor. Comput. Sci., 338(1-<br />
3):247–274, 2005.<br />
[71] Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, <strong>and</strong> L. Vigneron.<br />
Extending the dolev-yao intruder for analyzing an unbounded number<br />
<strong>of</strong> sessions. In M. Baaz <strong>and</strong> J. A. Makowsky, editors, CSL, volume 2803 <strong>of</strong><br />
Lecture Notes in Computer Science, pages 128–141. Springer, 2003.