Report
| Date
| Title
|
EDI-INF-RR-1004
| Jul 2007
| A Formal Theory of Key Conjuring
|
EDI-INF-RR-0863
| Sep 2006
| Automatic Analysis of the Security of XOR-based Key Management Schemes
|
EDI-INF-RR-0827
| Nov 2006
| Formal Analysis of PIN Block Attacks
|
EDI-INF-RR-0270
| 2004
| Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
|
EDI-INF-RR-0269
| 2004
| Attacking Group Multicast Key Management Protocols Using CORAL
|
EDI-INF-RR-0268
| Jan 2006
| Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
|
EDI-INF-RR-0267
| Jul 2005
| Deduction with XOR Constraints in Security API Modelling
|
EDI-INF-RR-0260
| Aug 1999
| Artificial Intelligence and Scientific Creativity
|
EDI-INF-RR-0179
| Oct 2003
| Attacking the Asokan--Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL
|
EDI-INF-RR-0141
| Jul 2002
| Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks
|
EDI-INF-RR-0019
| May 2000
| Cross Domain Mathematical Concept Formation
|