{"id":"https://openalex.org/W2053653542","doi":"https://doi.org/10.2168/lmcs-10(1:5)2014","title":"Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining","display_name":"Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining","publication_year":2014,"publication_date":"2014-02-09","ids":{"openalex":"https://openalex.org/W2053653542","doi":"https://doi.org/10.2168/lmcs-10(1:5)2014","mag":"2053653542"},"language":"en","primary_location":{"id":"doi:10.2168/lmcs-10(1:5)2014","is_oa":true,"landing_page_url":"https://doi.org/10.2168/lmcs-10(1:5)2014","pdf_url":"https://lmcs.episciences.org/808/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://lmcs.episciences.org/808/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025857046","display_name":"Siva Anantharaman","orcid":null},"institutions":[{"id":"https://openalex.org/I12449238","display_name":"Universit\u00e9 d'Orl\u00e9ans","ror":"https://ror.org/014zrew76","country_code":"FR","type":"education","lineage":["https://openalex.org/I12449238"]},{"id":"https://openalex.org/I4210160005","display_name":"Computer Science Laboratory of Lille","ror":null,"country_code":"FR","type":null,"lineage":["https://openalex.org/I4210160005"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Siva Anantharaman","raw_affiliation_strings":["LIFO, Universit d'Orlans (France)","LIFO\u2013Universit\u00e9 d\u2019Orl\u00e9ans, France"],"affiliations":[{"raw_affiliation_string":"LIFO, Universit d'Orlans (France)","institution_ids":["https://openalex.org/I4210160005"]},{"raw_affiliation_string":"LIFO\u2013Universit\u00e9 d\u2019Orl\u00e9ans, France","institution_ids":["https://openalex.org/I12449238"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012567125","display_name":"Christopher Bouchard","orcid":null},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christopher Bouchard","raw_affiliation_strings":["University at Albany\u2014SUNY"],"affiliations":[{"raw_affiliation_string":"University at Albany\u2014SUNY","institution_ids":["https://openalex.org/I392282"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083889587","display_name":"Paliath Narendran","orcid":"https://orcid.org/0000-0003-4521-5892"},"institutions":[{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paliath Narendran","raw_affiliation_strings":["University at Albany-SUNY (USA","University at Albany\u2014SUNY"],"affiliations":[{"raw_affiliation_string":"University at Albany-SUNY (USA","institution_ids":["https://openalex.org/I392282"]},{"raw_affiliation_string":"University at Albany\u2014SUNY","institution_ids":["https://openalex.org/I392282"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109895336","display_name":"Micha\u00ebl Rusinowitch","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en sciences et technologies du num\u00e9rique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I392282","display_name":"University at Albany, State University of New York","ror":"https://ror.org/012zs8222","country_code":"US","type":"education","lineage":["https://openalex.org/I392282"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]}],"countries":["FR","US"],"is_corresponding":false,"raw_author_name":"Micha\u00ebl Rusinowitch","raw_affiliation_strings":["Loria-INRIA Grand Est, Nancy (France","University at Albany-SUNY (USA","LORIA\u2013INRIA Grand Est, Nancy, France"],"affiliations":[{"raw_affiliation_string":"Loria-INRIA Grand Est, Nancy (France","institution_ids":["https://openalex.org/I4210127166","https://openalex.org/I4210121838"]},{"raw_affiliation_string":"University at Albany-SUNY (USA","institution_ids":["https://openalex.org/I392282"]},{"raw_affiliation_string":"LORIA\u2013INRIA Grand Est, Nancy, France","institution_ids":["https://openalex.org/I4210127166","https://openalex.org/I1326498283","https://openalex.org/I4210121838"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025857046"],"corresponding_institution_ids":["https://openalex.org/I12449238","https://openalex.org/I4210160005"],"apc_list":null,"apc_paid":null,"fwci":0.4228,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75010921,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"Volume 10, Issue 1","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5726490020751953},{"id":"https://openalex.org/keywords/modulo","display_name":"Modulo","score":0.5723257660865784},{"id":"https://openalex.org/keywords/unification","display_name":"Unification","score":0.4767616391181946},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4642506241798401},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.441273957490921},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3809069097042084},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3761080801486969},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.37296009063720703},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3633492588996887},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1862591803073883}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5726490020751953},{"id":"https://openalex.org/C54732982","wikidata":"https://www.wikidata.org/wiki/Q1415345","display_name":"Modulo","level":2,"score":0.5723257660865784},{"id":"https://openalex.org/C96146094","wikidata":"https://www.wikidata.org/wiki/Q609057","display_name":"Unification","level":2,"score":0.4767616391181946},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4642506241798401},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.441273957490921},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3809069097042084},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3761080801486969},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.37296009063720703},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3633492588996887},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1862591803073883},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.2168/lmcs-10(1:5)2014","is_oa":true,"landing_page_url":"https://doi.org/10.2168/lmcs-10(1:5)2014","pdf_url":"https://lmcs.episciences.org/808/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1401.0445","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1401.0445","pdf_url":"https://arxiv.org/pdf/1401.0445","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:HAL:hal-00854841v3","is_oa":true,"landing_page_url":"https://hal.science/hal-00854841","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Logical Methods in Computer Science, 2014, 10 (1:5), pp. 1--26. &#x27E8;10.2168/LMCS-10(1:5)2014&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:doaj.org/article:08ed3c5fa62b4a44beab05cf2484ee72","is_oa":true,"landing_page_url":"https://doaj.org/article/08ed3c5fa62b4a44beab05cf2484ee72","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Logical Methods in Computer Science, Vol Volume 10, Issue 1 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.2168/lmcs-10(1:5)2014","is_oa":true,"landing_page_url":"https://doi.org/10.2168/lmcs-10(1:5)2014","pdf_url":"https://lmcs.episciences.org/808/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1636627628","display_name":"TC: Medium: Collaborative Research: Unification Laboratory: Increasing the Power of Cryptographic Protocol Analysis Tools","funder_award_id":"0905286","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2053653542.pdf","grobid_xml":"https://content.openalex.org/works/W2053653542.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W39167138","https://openalex.org/W1557437480","https://openalex.org/W1566539263","https://openalex.org/W1602675124","https://openalex.org/W1975688140","https://openalex.org/W1996497395","https://openalex.org/W2060349224","https://openalex.org/W2121757274","https://openalex.org/W2130123502","https://openalex.org/W2151837020","https://openalex.org/W2167569963"],"related_works":["https://openalex.org/W2367630557","https://openalex.org/W101666983","https://openalex.org/W2183792531","https://openalex.org/W2595286499","https://openalex.org/W2794344379","https://openalex.org/W2471908688","https://openalex.org/W1845283042","https://openalex.org/W3171337446","https://openalex.org/W2884423176","https://openalex.org/W2070522125"],"abstract_inverted_index":{"We":[0,14],"investigate":[1],"unification":[2,63,121,171],"problems":[3],"related":[4],"to":[5,104,179],"the":[6,45,62,74,88,95,98,134,140],"Cipher":[7],"Block":[8],"Chaining":[9],"(CBC)":[10],"mode":[11,137,162],"of":[12,20,41,53,85,90,97,117,119],"encryption.":[13],"first":[15],"model":[16,49],"chaining":[17,160],"in":[18,73],"terms":[19],"a":[21,27,38,83,129,158],"simple,":[22],"convergent,":[23],"rewrite":[24,46,67,148],"system":[25,47,84,149,175],"over":[26,103],"signature":[28,43],"with":[29],"two":[30],"disjoint":[31],"sorts:":[32],"list":[33],"and":[34,87,170],"element.":[35],"By":[36],"interpreting":[37],"particular":[39],"symbol":[40],"this":[42,66,120,173],"suitably,":[44],"can":[48],"several":[50],"practical":[51],"situations":[52],"interest.":[54],"An":[55,115],"inference":[56],"procedure":[57,70,107,122],"is":[58,71,80,100,109,123,150,176],"presented":[59],"for":[60,111],"deciding":[61],"problem":[64,79,99],"modulo":[65,172],"system.":[68],"The":[69,145],"modular":[72],"following":[75],"sense:":[76],"any":[77,105],"given":[78],"handled":[81],"by":[82],"`list-inferences',":[86],"set":[89],"equations":[91],"thus":[92],"derived":[93],"between":[94],"element-terms":[96],"then":[101,151],"handed":[102],"(`black-box')":[106],"which":[108],"complete":[110],"solving":[112],"these":[113],"element-equations.":[114],"example":[116],"application":[118],"given,":[124],"as":[125],"attack":[126],"detection":[127],"on":[128,139],"Needham-Schroeder":[130],"like":[131],"protocol,":[132],"employing":[133],"CBC":[135],"encryption":[136],"based":[138],"associative-commutative":[141],"(AC)":[142],"operator":[143],"XOR.":[144],"2-sorted":[146],"convergent":[147],"extended":[152,174],"into":[153],"one":[154],"that":[155],"fully":[156],"captures":[157],"block":[159],"encryption-decryption":[161],"at":[163],"an":[164],"abstract":[165],"level,":[166],"using":[167],"no":[168],"AC-symbols;":[169],"also":[177],"shown":[178],"be":[180],"decidable.":[181]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2016-06-24T00:00:00"}
