Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
BIBLIOGRAPHY 209<br />
[94] M. Daum <strong>and</strong> S. Lucks. Attacking hash functions by poisoned messages.<br />
rump session, Eurocrypt, 2005.<br />
[95] S. Delaune <strong>and</strong> F. Jacquemard. Narrowing−based constraint solving for<br />
the verification <strong>of</strong> security protocols. In Proceedings <strong>of</strong> the 18th International<br />
Workshop <strong>of</strong> Unification (UNIF’04), Cork, Irel<strong>and</strong>, 2004.<br />
[96] S. Delaune <strong>and</strong> F. Jacquemard. A theory <strong>of</strong> dictionary attacks <strong>and</strong> its complexity.<br />
In CSFW, pages 2–15. IEEE Computer Society, 2004.<br />
[97] S. Delaune, S. Kremer, <strong>and</strong> M. Ryan. Verifying privacy-type properties<br />
<strong>of</strong> electronic voting protocols. Journal <strong>of</strong> Computer Security, 17(4):435–487,<br />
2009.<br />
[98] B. den Boer <strong>and</strong> A. Bosselaers. Collisions for the compressin function <strong>of</strong><br />
md5. In EUROCRYPT, pages 293–304, 1993.<br />
[99] D. E. Denning <strong>and</strong> G. M. Sacco. Timestamps in key distribution protocols.<br />
Commun. ACM, 24(8):533–536, 1981.<br />
[100] N. Dershowitz <strong>and</strong> J.P Jouannaud. Rewrite systems. In H<strong>and</strong>book <strong>of</strong> Theoretical<br />
Computer Science, Volume B: Formal Models <strong>and</strong> Sematics (B), pages<br />
243–320. 1990.<br />
[101] W. Diffie <strong>and</strong> M.E. Hellman. Nex directions in cryptography. IEEE Trans.<br />
Info. Theory IT-22, pages 644–654, November 1976.<br />
[102] W. Diffie, P.l C. van Oorschot, <strong>and</strong> M.l J. Wiener. Authentication <strong>and</strong> authenticated<br />
key exchanges. Des. Codes Cryptography, 2(2):107–125, 1992.<br />
[103] H. Dobbertin. Cryptanalysis <strong>of</strong> md5 compress. rumps session, Eurocrypt,<br />
1996.<br />
[104] H. Dobbertin. Cryptanalysis <strong>of</strong> md4. In D. Gollmann editor, FSE, volume<br />
1039 <strong>of</strong> Lecture Notes in Computer Science, pages 53–69, Springer, 1996.<br />
[105] H. Dobbertin, A. Bosselaers, <strong>and</strong> B. Preneel. Ripemd-160: A strengthened<br />
version <strong>of</strong> ripemd. In D. Gollmann editor, FSE, volume 1039 <strong>of</strong> Lecture Notes<br />
in Computer Science, pages 71–82, Springer, 1996.<br />
[106] D. Dolev, S. Even, <strong>and</strong> R. M. Karp. On the security <strong>of</strong> ping-pong protocols.<br />
Information <strong>and</strong> Control, 55(1-3):57–68, 1982.<br />
[107] D. Dolev <strong>and</strong> A. Chi-Chih Yao. On the security <strong>of</strong> public key protocols.<br />
IEEE Transactions on Information Theory, 29(2):198–207, 1983.