@article(Abadi04c, author = {Mart{\'\i}n Abadi and Bruno Blanchet}, year = {2005}, title = {Analyzing Security Protocols with Secrecy Types and Logic Programs}, journal = {Journal of the ACM}, volume = {52}, number = {1}, pages = {102--146}, doi = {10.1145/1044731.1044735}, url = {https://bblanche.gitlabpages.inria.fr/publications/AbadiBlanchetJACM7037.html}, ) @article(AbadiBlanchetFournetJACM17, author = {Mart{\'\i}n Abadi and Bruno Blanchet and C{\'e}dric Fournet}, year = {2017}, title = {The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication}, journal = {Journal of the ACM}, volume = {65}, number = {1}, pages = {1:1--1:41}, doi = {10.1145/3127586}, url = {https://bblanche.gitlabpages.inria.fr/publications/AbadiBlanchetFournetJACM17.html}, ) @inproceedings(Abadi2001, author = {Mart{\'\i}n Abadi and C{\'e}dric Fournet}, year = {2001}, title = {Mobile Values, New Names, and Secure Communication}, booktitle = {28th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01)}, publisher = {ACM Press}, address = {New York, NY}, pages = {104--115}, doi = {10.1145/360204.360213}, ) @inproceedings(Allamigeon05, author = {Xavier Allamigeon and Bruno Blanchet}, year = {2005}, title = {Reconstruction of Attacks against Cryptographic Protocols}, booktitle = {18th IEEE Computer Security Foundations Workshop (CSFW-18)}, publisher = {IEEE Computer Society Press}, address = {Los Alamitos, CA}, pages = {140--154}, doi = {10.1109/CSFW.2005.25}, url = {https://bblanche.gitlabpages.inria.fr/publications/AllamigeonBlanchetCSFW05.html}, ) @incollection(Bachmair01, author = {L. Bachmair and H. Ganzinger}, year = {2001}, title = {Resolution Theorem Proving}, editor = {A. Robinson and A. Voronkov}, booktitle = {Handbook of Automated Reasoning}, chapter = {2}, volume = {1}, publisher = {North Holland}, pages = {19--100}, doi = {10.1016/B978-044450813-3/50004-7}, ) @inproceedings(BarbosaetalOakland21, author = {Manuel Barbosa and Gilles Barthe and Karthikeyan Bhargavan and Bruno Blanchet and Cas Cremers and Kevin Liao and Bryan Parno}, year = {2021}, title = {{SoK}: Computer-Aided Cryptography}, booktitle = {IEEE Symposium on Security and Privacy (S\&P'21)}, publisher = {IEEE Computer Society Press}, address = {Los Alamitos, CA}, pages = {777--795}, doi = {10.1109/SP40001.2021.00008}, url = {https://bblanche.gitlabpages.inria.fr/publications/BarbosaetalOakland21.html}, ) @article(Bellman58, author = {Richard Bellman}, year = {1958}, title = {On a routing problem}, journal = {Quarterly of Applied Mathematics}, volume = {16}, pages = {87--90}, doi = {10.1090/qam/102435}, ) @article(Blanchet05b, author = {Bruno Blanchet}, year = {2005}, title = {Security Protocols: From Linear to Classical Logic by Abstract Interpretation}, journal = {Information Processing Letters}, volume = {95}, number = {5}, pages = {473--479}, doi = {10.1016/j.ipl.2005.05.011}, url = {https://bblanche.gitlabpages.inria.fr/publications/BlanchetIPL05.html}, ) @article(Blanchet08c, author = {Bruno Blanchet}, year = {2009}, title = {Automatic Verification of Correspondences for Security Protocols}, journal = {Journal of Computer Security}, volume = {17}, number = {4}, pages = {363--434}, doi = {10.3233/JCS-2009-0339}, url = {https://bblanche.gitlabpages.inria.fr/publications/BlanchetJCS08.html}, ) @inproceedings(BlanchetETAPS12, author = {Bruno Blanchet}, year = {2012}, title = {Security Protocol Verification: Symbolic and Computational Models}, editor = {Pierpaolo Degano and Joshua Guttman}, booktitle = {First Conference on Principles of Security and Trust (POST'12)}, series = {Lecture Notes in Computer Science}, volume = {7215}, publisher = {Springer}, address = {Berlin, Heidelberg}, pages = {3--29}, doi = {10.1007/978-3-642-28641-4_2}, url = {https://bblanche.gitlabpages.inria.fr/publications/BlanchetETAPS12.html}, ) @article(Blanchet16b, author = {Bruno Blanchet}, year = {2016}, title = {Modeling and Verifying Security Protocols with the Applied Pi Calculus and {P}ro{V}erif}, journal = {Foundations and Trends in Privacy and Security}, volume = {1}, number = {1--2}, pages = {1--135}, doi = {10.1561/3300000004}, url = {https://bblanche.gitlabpages.inria.fr/publications/BlanchetFnTPS16.html}, ) @article(Blanchet07b, author = {Bruno Blanchet and Mart{\'\i}n Abadi and C{\'e}dric Fournet}, year = {2008}, title = {Automated Verification of Selected Equivalences for Security Protocols}, journal = {Journal of Logic and Algebraic Programming}, volume = {75}, number = {1}, pages = {3--51}, doi = {10.1016/j.jlap.2007.06.002}, url = {https://bblanche.gitlabpages.inria.fr/publications/BlanchetAbadiFournetJLAP07.html}, ) @inproceedings(Blanchet22, author = {Bruno Blanchet and Vincent Cheval and V{\'e}ronique Cortier}, year = {2022}, title = {{P}ro{V}erif with lemmas, induction, fast subsumption, and much more}, booktitle = {IEEE Symposium on Security and Privacy (S\&P'22)}, publisher = {IEEE Computer Society Press}, address = {Los Alamitos, CA}, pages = {205--222}, doi = {10.1109/SP46214.2022.00013}, url = {https://bblanche.gitlabpages.inria.fr/publications/BlanchetEtAlSP22.html}, ) @article(Denning81, author = {Dorothy E. Denning and Giovanni Maria Sacco}, year = {1981}, title = {Timestamps in Key Distribution Protocols}, journal = {Communications of the ACM}, volume = {24}, number = {8}, pages = {533--536}, doi = {10.1145/358722.358740}, ) @article(Dolev83, author = {Danny Dolev and Andrew C. Yao}, year = {1983}, title = {On the Security of Public Key Protocols}, journal = {IEEE Transactions on Information Theory}, volume = {{IT}-29}, number = {12}, pages = {198--208}, doi = {10.1109/TIT.1983.1056650}, ) @article(Durgin04, author = {Nancy Durgin and Patrick Lincoln and John C. Mitchell and Andre Scedrov}, year = {2004}, title = {Multiset Rewriting and the Complexity of Bounded Security Protocols}, journal = {Journal of Computer Security}, volume = {12}, number = {2}, pages = {247--311}, doi = {10.3233/JCS-2004-12203}, ) @inproceedings(Meier13, author = {Simon Meier and Benedikt Schmidt and Cas Cremers and David Basin}, year = {2013}, title = {The {TAMARIN} prover for symbolic analysis of security protocols}, editor = {Natasha Sharygina and Helmut Veith}, booktitle = {International Conference on Computer-Aided Verification (CAV'13)}, series = {Lecture Notes in Computer Science}, volume = {8044}, publisher = {Springer}, pages = {696--701}, doi = {10.1007/978-3-642-39799-8_48}, ) @article(Needham78, author = {Roger M. Needham and Michael D. Schroeder}, year = {1978}, title = {Using Encryption for Authentication in Large Networks of Computers}, journal = {Communications of the ACM}, volume = {21}, number = {12}, pages = {993--999}, doi = {10.1145/359657.359659}, ) @inproceedings(Schulz13, author = {Stephan Schulz}, year = {2013}, title = {Simple and Efficient Clause Subsumption with Feature Vector Indexing}, editor = {Maria Paola Bonacina and Mark E. Stickel}, booktitle = {Automated Reasoning and Mathematics: Essays in Memory of William W. McCune}, series = {Lecture Notes in Artificial Intelligence}, volume = {7788}, publisher = {Springer}, address = {Berlin, Heidelberg}, pages = {45--67}, doi = {10.1007/978-3-642-36675-8_3}, ) @inproceedings(Woo93, author = {Thomas Y. C. Woo and Simon S. Lam}, year = {1993}, title = {A Semantic Model for Authentication Protocols}, booktitle = {Proceedings IEEE Symposium on Research in Security and Privacy}, publisher = {IEEE Computer Society Press}, address = {Los Alamitos, CA}, pages = {178--194}, doi = {10.1109/RISP.1993.287633}, )