30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY 209<br />

[94] M. Daum <strong>and</strong> S. Lucks. Attacking hash functions by poisoned messages.<br />

rump session, Eurocrypt, 2005.<br />

[95] S. Delaune <strong>and</strong> F. Jacquemard. Narrowing−based constraint solving for<br />

the verification <strong>of</strong> security protocols. In Proceedings <strong>of</strong> the 18th International<br />

Workshop <strong>of</strong> Unification (UNIF’04), Cork, Irel<strong>and</strong>, 2004.<br />

[96] S. Delaune <strong>and</strong> F. Jacquemard. A theory <strong>of</strong> dictionary attacks <strong>and</strong> its complexity.<br />

In CSFW, pages 2–15. IEEE Computer Society, 2004.<br />

[97] S. Delaune, S. Kremer, <strong>and</strong> M. Ryan. Verifying privacy-type properties<br />

<strong>of</strong> electronic voting protocols. Journal <strong>of</strong> Computer Security, 17(4):435–487,<br />

2009.<br />

[98] B. den Boer <strong>and</strong> A. Bosselaers. Collisions for the compressin function <strong>of</strong><br />

md5. In EUROCRYPT, pages 293–304, 1993.<br />

[99] D. E. Denning <strong>and</strong> G. M. Sacco. Timestamps in key distribution protocols.<br />

Commun. ACM, 24(8):533–536, 1981.<br />

[100] N. Dershowitz <strong>and</strong> J.P Jouannaud. Rewrite systems. In H<strong>and</strong>book <strong>of</strong> Theoretical<br />

Computer Science, Volume B: Formal Models <strong>and</strong> Sematics (B), pages<br />

243–320. 1990.<br />

[101] W. Diffie <strong>and</strong> M.E. Hellman. Nex directions in cryptography. IEEE Trans.<br />

Info. Theory IT-22, pages 644–654, November 1976.<br />

[102] W. Diffie, P.l C. van Oorschot, <strong>and</strong> M.l J. Wiener. Authentication <strong>and</strong> authenticated<br />

key exchanges. Des. Codes Cryptography, 2(2):107–125, 1992.<br />

[103] H. Dobbertin. Cryptanalysis <strong>of</strong> md5 compress. rumps session, Eurocrypt,<br />

1996.<br />

[104] H. Dobbertin. Cryptanalysis <strong>of</strong> md4. In D. Gollmann editor, FSE, volume<br />

1039 <strong>of</strong> Lecture Notes in Computer Science, pages 53–69, Springer, 1996.<br />

[105] H. Dobbertin, A. Bosselaers, <strong>and</strong> B. Preneel. Ripemd-160: A strengthened<br />

version <strong>of</strong> ripemd. In D. Gollmann editor, FSE, volume 1039 <strong>of</strong> Lecture Notes<br />

in Computer Science, pages 71–82, Springer, 1996.<br />

[106] D. Dolev, S. Even, <strong>and</strong> R. M. Karp. On the security <strong>of</strong> ping-pong protocols.<br />

Information <strong>and</strong> Control, 55(1-3):57–68, 1982.<br />

[107] D. Dolev <strong>and</strong> A. Chi-Chih Yao. On the security <strong>of</strong> public key protocols.<br />

IEEE Transactions on Information Theory, 29(2):198–207, 1983.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!