1996
DOI: 10.1007/3-540-61511-3_90
|View full text |Cite
|
Sign up to set email alerts
|

Unification and matching modulo nilpotence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
8

Year Published

1997
1997
2014
2014

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 7 publications
0
4
0
8
Order By: Relevance
“…Proof. NP-hardness follows from the fact that general unification modulo XOR is NPcomplete [12]. We deduce the NP-upper bound from the following facts: a) For any given BC-unification problem, computing a standard form is in polynomial time, wrt the size of the problem.…”
Section: Bc 1 -Unification Is Np-completementioning
confidence: 99%
“…Proof. NP-hardness follows from the fact that general unification modulo XOR is NPcomplete [12]. We deduce the NP-upper bound from the following facts: a) For any given BC-unification problem, computing a standard form is in polynomial time, wrt the size of the problem.…”
Section: Bc 1 -Unification Is Np-completementioning
confidence: 99%
“…This equational theory is relevant because none of our previously defined unification procedures is directly applicable to it, e.g. unification algorithms for exclusive-or such as [22] do not directly apply if extra equations are added. For (Σ, Ax, E) a decomposition of XOR ∪ pk-sk, and for terms t = M ⊕sk(K, pk(K, M )) and s = X⊕sk(K, pk(K, Y )), we have that [[t]] E,Ax = {(0, id), .…”
Section: Definition 2 (Variant Semanticsmentioning
confidence: 99%
“…Efficient unification algorithms have been developed for elementary AGH-unification [5,6]. However, cryptographic protocol analysis also must deal with uninterpreted function symbols.…”
Section: Introductionmentioning
confidence: 99%