ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0808.0634
  4. Cited By
Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn
  Theory Based Approach

Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach

Journal of automated reasoning (JAR), 2008
5 August 2008
Ralf Küsters
Tomasz Truderung
ArXiv (abs)PDFHTML

Papers citing "Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach"

9 / 9 papers shown
CryptoBap: A Binary Analysis Platform for Cryptographic Protocols
CryptoBap: A Binary Analysis Platform for Cryptographic ProtocolsConference on Computer and Communications Security (CCS), 2023
Faezeh Nasrabadi
Robert Künnemann
Hamed Nemati
221
3
0
28 Aug 2023
Verifying Cryptographic Security Implementations in C Using Automated
  Model Extraction
Verifying Cryptographic Security Implementations in C Using Automated Model Extraction
Mihhail Aizatulin
162
3
0
03 Jan 2020
A formal methodology for integral security design and verification of
  network protocols
A formal methodology for integral security design and verification of network protocolsJournal of Systems and Software (JSS), 2012
Jesús Díaz
David Arroyo
F. Ortiz
264
19
0
26 Jan 2012
Extracting and Verifying Cryptographic Models from C Protocol Code by
  Symbolic Execution
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Mihhail Aizatulin
Andrew D. Gordon
Jan Jurjens
230
68
0
06 Jul 2011
Satisfiability of General Intruder Constraints with and without a Set
  Constructor
Satisfiability of General Intruder Constraints with and without a Set ConstructorJournal of symbolic computation (JSC), 2011
Tigran Avanesov
Yannick Chevalier
M. Rusinowitch
Mathieu Turuani
317
5
0
01 Mar 2011
YAPA: A generic tool for computing intruder knowledge
YAPA: A generic tool for computing intruder knowledge
M. Baudet
V. Cortier
S. Delaune
228
49
0
05 May 2010
How to prevent type-flaw and multi-protocol attacks on cryptographic
  protocols under Exclusive-OR
How to prevent type-flaw and multi-protocol attacks on cryptographic protocols under Exclusive-OR
S. Malladi
209
0
0
14 Apr 2010
Protocol indepedence through disjoint encryption under Exclusive-OR
Protocol indepedence through disjoint encryption under Exclusive-OR
S. Malladi
237
4
0
28 Mar 2010
An Epistemic Approach to Coercion-Resistance for Electronic Voting
  Protocols
An Epistemic Approach to Coercion-Resistance for Electronic Voting ProtocolsIEEE Symposium on Security and Privacy (IEEE S&P), 2009
Ralf Küsters
Tomasz Truderung
351
65
0
04 Mar 2009
1
Page 1 of 1