This introduction tries to give the big picture on the goals, design philosophy, logical foundations, applications, and overall structure of Maude. It is written in an impressionistic …
A security protocol is a distributed program that might be executed on a network controlled by an adversary. Even in such a setting, the protocol should satisfy the desired security …
C Bouchard, KA Gero, C Lynch… - Frontiers of Combining …, 2013 - Springer
Equational unification is an important research area with many applications, such as cryptographic protocol analysis. Unification modulo a convergent term rewrite system is …
S Escobar, R López-Rueda, J Sapiña - Proceedings of the 9th ACM …, 2023 - dl.acm.org
Symbolic reachability analysis using rewriting with Satisfiability Modulo Theories (SMT) has been used to model different systems, including a variety of security protocols. Recently, it …
A Cholewa, S Escobar, J Meseguer - Science of Computer Programming, 2015 - Elsevier
For an unconditional equational theory (Σ, E) whose oriented equations E→ are confluent and terminating, narrowing provides an E-unification algorithm. This has been generalized …
We present a new paradigm for unification arising out of a technique commonly used in cryptographic protocol analysis tools that employ unification modulo equational theories …
Untitled Page 1 Page 2 Information Security and Cryptography Texts and Monographs Series Editor Ueli Maurer Associate Editors Martin Abadi Ross Anderson Mihir Bellare …
R López-Rueda, S Escobar, J Sapiña - … of Logical and Algebraic Methods in …, 2023 - Elsevier
Narrowing and unification are very useful tools for symbolic analysis of rewrite theories, and thus for any model that can be specified in that way. A very clear example of their application …
Research in the formal analysis of cryptographic protocols has produced much good work in the solving of equality constraints, developing new methods for unification, matching, and …