30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAPHY 217<br />

[200] X. Wang, X. Lai, D. Feng, H. Chen, <strong>and</strong> X. Yu. Cryptanalysis <strong>of</strong> the hash<br />

functions md4 <strong>and</strong> ripemd. In R. Cramer editor, EUROCRYPT, volume 3494<br />

<strong>of</strong> Lecture Notes in Computer Science, pages 1–18, Springer, 2005.<br />

[201] X. Wang, Y. L. Yin, <strong>and</strong> H. Yu. Finding collisions in the full sha-1. In<br />

V. Shoup, editor, CRYPTO, volume 3621 <strong>of</strong> Lecture Notes in Computer Science,<br />

pages 17–36. Springer, 2005.<br />

[202] X. Wang <strong>and</strong> H. Yu. How to break md5 <strong>and</strong> other hash functions. In<br />

R. Cramer editor, EUROCRYPT, volume 3494 <strong>of</strong> Lecture Notes in Computer<br />

Science, pages 19–35, Springer, 2005.<br />

[203] B. Warinschi. A computational analysis <strong>of</strong> the needham-schroeder-(lowe)<br />

protocol. Journal <strong>of</strong> Computer Security, 13(3):565–591, 2005.<br />

[204] J. Yajima <strong>and</strong> T. Shimoyama. Wang’s sufficient conditions <strong>of</strong> md5 are not<br />

sufficient. 2005.<br />

[205] E. Zalinescu. Sécurité des protocoles cryptographiques: décidabilité et résultats<br />

de transfert. Thèse de doctorat, INRIA, University <strong>of</strong> Henri Pointcaré,<br />

Nancy, 2007.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!