Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
0808.0634
Cited By
Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach
5 August 2008
Ralf Küsters
Tomasz Truderung
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach"
4 / 4 papers shown
Title
Verifying Cryptographic Security Implementations in C Using Automated Model Extraction
Mihhail Aizatulin
13
2
0
03 Jan 2020
YAPA: A generic tool for computing intruder knowledge
M. Baudet
V. Cortier
S. Delaune
64
47
0
05 May 2010
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols
Ralf Küsters
Tomasz Truderung
65
64
0
04 Mar 2009
Automatic Verification of Correspondences for Security Protocols
B. Blanchet
89
241
0
23 Feb 2008
1