The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, 17th International Conference, CAV 2005 Proceedings, pp.281-285, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
Formal analysis of SAML 2 ,
Mobile values, new names, and secure communication A calculus for cryptographic protocols: The spi calculus, Conference Record of POPL 2001: The 28th ACM SIGPLAN- SIGACT Symposium on Principles of Programming LanguagesAR02] Martín Abadi and Phillip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology, pp.104-1151, 1999. ,
Computationally complete symbolic attacker in action, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2012 Schloss Dagstuhl -Leibniz- Zentrum fuer Informatik, pp.546-560, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00863379
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker, Principles of Secu- BIBLIOGRAPHY rity and Trust -First International Conference Held as Part of the European Joint Conferences on Theory and Practice of Software Proceedings, pp.189-208, 2012. ,
DOI : 10.1007/978-3-642-28641-4_11
URL : https://hal.archives-ouvertes.fr/hal-00863380
A computationally complete symbolic attacker for equivalence properties Deduction soundness: prove one, get five for free, Proc. ACM Conference on Computers and Communications Security 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, pp.1261-1272, 2013. ,
Verified Cryptographic Implementations for TLS, ACM Transactions on Information and System Security, vol.15, issue.1, p.3, 2012. ,
DOI : 10.1145/2133375.2133378
URL : https://hal.archives-ouvertes.fr/hal-00863381
Automated complexity analysis based on ordered resolution, J. ACM, vol.48, issue.1, pp.70-109, 2001. ,
Computer-Aided Security Proofs for the Working Cryptographer, Advances in Cryptology -CRYPTO 2011 -31st Annual Cryptology Conference Proceedings, pp.71-90, 2011. ,
DOI : 10.1007/978-3-642-22792-9_5
URL : https://hal.archives-ouvertes.fr/hal-01112075
Beyond provable security verifiable IND- CCA security of OAEP Topics in Cryptology -CT-RSA 2011 -The Cryptographers' Track at the RSA Conference, Proceedings, pp.180-196, 2011. ,
Computationally complete symbolic attacker and key exchange, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1231-1246, 2013. ,
DOI : 10.1145/2508859.2516710
URL : https://hal.archives-ouvertes.fr/hal-00918848
Incremental Unforgeable Encryption, Fast Software Encryption, 8th International Workshop, pp.109-124, 2001. ,
DOI : 10.1007/3-540-45473-X_9
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.11-13, 2001. ,
DOI : 10.1109/CSFW.2001.930138
A computationally sound mechanized prover for security protocols Computational soundness without protocol restrictions, IEEE Symposium on Security and Privacy the ACM Conference on Computer and Communications Security, CCS'12, pp.21-24, 2006. ,
Authenticated Encryption: Relations among Notions and??Analysis of the Generic Composition Paradigm, Journal of Cryptology, vol.13, issue.3, pp.469-491, 2008. ,
DOI : 10.1007/s00145-008-9026-x
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., pp.28-30, 2004. ,
DOI : 10.1109/CSFW.2004.1310742
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR, Proc. 10th European Symposium on Research in Computer Security (ESORICS), 2005. ,
DOI : 10.1007/11555827_11
Optimal asymmetric encryption Advances in Cryptology -EU- ROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Proceedings, pp.92-111, 1994. ,
Encryptionscheme security in the presence of key-dependent messages, Selected Areas in Cryptography, 9th Annual International Workshop, 2002. ,
Revised Papers, Lecture Notes in Computer Science, vol.2595, pp.62-75, 2002. ,
Computational soundness of observational equivalence, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.109-118, 2008. ,
DOI : 10.1145/1455770.1455786
Automating Security Analysis: Symbolic Equivalence of Constraint Systems, Automated Reasoning, 5th International Joint Conference, IJCAR 2010 Proceedings, pp.412-426, 2010. ,
DOI : 10.1007/978-3-642-14203-1_35
Security proof with dishonest keys Held as Part of the European Joint Conferences on Theory and Practice of Software, BIBLIOGRAPHY ETAPS 2012 Computational soundness of indistinguishability properties without computable parsing, Principles of Security and Trust - First International Conference ProceedingsCHKS12] Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, and Hideki Sakurada Information Security Practice and Experience -8th International Conference, pp.149-168, 2012. ,
The scyther tool: Verification, falsification, and analysis of security protocols, Computer Aided Verification, 20th International Conference Proceedings, pp.414-418, 2008. ,
The first-order theory of lexicographic path orderings is undecidable, Theoretical Computer Science, vol.176, issue.1-2, pp.67-87, 1997. ,
DOI : 10.1016/S0304-3975(96)00049-7
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic, Automata , Languages and Programming, 32nd International Colloquium , ICALP 2005 Proceedings, pp.16-29, 2005. ,
DOI : 10.1007/11523468_2
URL : https://hal.archives-ouvertes.fr/inria-00103654
Computationally Sound Compositional Logic for Key Exchange Protocols, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.321-334, 2006. ,
DOI : 10.1109/CSFW.2006.9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.5001
On the security of public key protocols, FKS11] Cédric Fournet, Markulf Kohlweiss, and Pierre-Yves Strub Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp.198-208529, 1970. ,
DOI : 10.1109/TIT.1983.1056650
RSA-OAEP is secure under the RSA assumption A public key cryptosystem and a signature scheme based on discrete logarithms, Gam85] Taher El Gamal, pp.81-104, 1985. ,
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : http://doi.org/10.1016/0022-0000(84)90070-9
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs, Cryptographic Hardware and Embedded Systems -CHES 2008, 10th International Workshop. Proceedings, pp.15-29, 2008. ,
DOI : 10.1007/978-3-540-85053-3_2
Timing attacks on implementations of diffiehellman , rsa, dss, and other systems, Advances in Cryptology -CRYPTO '96, 16th Annual International Cryptology Conference Proceedings, pp.104-113, 1996. ,
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, Programming Languages and Systems, 14th European Symposium on Programming,ESOP 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005 Proceedings, pp.186-200, 2005. ,
DOI : 10.1007/978-3-540-31987-0_14
An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters, vol.56, issue.3, pp.131-133284, 1993. ,
DOI : 10.1016/0020-0190(95)00144-2
Completeness theorems for the Abadi???Rogaway language of encrypted expressions1, Journal of Computer Security, vol.12, issue.1, pp.99-130, 2004. ,
DOI : 10.3233/JCS-2004-12105
Paramodulation-Based Theorem Proving, Handbook of Automated Reasoning (in 2 volumes, 2001. ,
DOI : 10.1016/B978-044450813-3/50009-6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.6344
Using encryption for authentication in large networks of computers, Commun. ACM, vol.21, issue.12, pp.993-999, 1978. ,
Advanced Course on Contemporary Cryptology, chapter Provable Security for Public-Key Schemes Advanced Courses CRM Barcelona, pp.133-189, 2005. ,
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols, Trustworthy Global Computing , Third Symposium, TGC 2007, pp.312-329, 2007. ,
DOI : 10.1007/978-3-540-78663-4_21
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, Advances in Cryptology -CRYPTO '91, 11th Annual International Cryptology Conference ProceedingsSat89] Mahadev Satyanarayanan, pp.433-444247, 1989. ,
DOI : 10.1007/3-540-46766-1_35
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography, 1999. ,
Strand spaces: proving security protocols correct, Journal of Computer Security, vol.7, issue.2-3, pp.191-230, 1999. ,
DOI : 10.3233/JCS-1999-72-304
A computational analysis of the Needham- Schröeder-(Lowe) protocol, 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003) Cryptanalysis of the enigma ? wikipedia, the free encyclopedia, p.248, 2003. ,