@COMMENT This file was generated by bib2html.pl <https://sourceforge.net/projects/bib2html/> version 0.94
@COMMENT written by Patrick Riley <http://sourceforge.net/users/patstg/>
@techreport{Prouve:rap2,
  author =        {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie and
                   Lafourcade, Pascal},
  institution =   {projet RNTL PROUV{\'E}},
  month =         jun,
  note =          {19~pages},
  number =        {2},
  type =          {Technical Report},
  title =         {A Survey of Algebraic Properties Used in
                   Cryptographic Protocols},
  year =          {2004},
  abstract =      {Using the \emph{perfect encryption assumption},
                   cryptographic primitives are often represented by
                   free function symbols. However some attacks and even
                   honest runs may use algebraic properties of the
                   operators like the exclusive or, the modular
                   exponentiation, the addition, etc.\par We give here a
                   survey of protocols and attacks using such algebraic
                   properties.},
}
