Santiago Escobar

Orcid: 0000-0002-3550-4781

Affiliations:
  • Polytechnic University of Valencia, Spain


According to our database1, Santiago Escobar authored at least 124 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol.
IEEE Access, 2024

Verifying Invariants by Deductive Model Checking.
Proceedings of the Rewriting Logic and Its Applications - 15th International Workshop, 2024

Programming Open Distributed Systems in Maude.
Proceedings of the 26th International Symposium on Principles and Practice of Declarative Programming, 2024

NuITP: An Inductive Theorem Prover for Equational Program Verification.
Proceedings of the 26th International Symposium on Principles and Practice of Declarative Programming, 2024

2023
An efficient canonical narrowing implementation with irreducibility and SMT constraints for generic symbolic protocol analysis.
J. Log. Algebraic Methods Program., October, 2023

Safety enforcement via programmable strategies in Maude.
J. Log. Algebraic Methods Program., April, 2023

Hybrid post-quantum Transport Layer Security formal analysis in Maude-NPA and its parallel version.
PeerJ Comput. Sci., 2023

Modelling and verification of post-quantum key encapsulation mechanisms using Maude.
PeerJ Comput. Sci., 2023

Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude.
IET Inf. Secur., 2023

Symbolic Analysis by Using Folding Narrowing with Irreducibility and SMT Constraints.
Proceedings of the 9th ACM SIGPLAN International Workshop on Formal Techniques for Safety-Critical Systems, 2023

Protocol Dialects as Formal Patterns.
Proceedings of the Computer Security - ESORICS 2023, 2023

Optimizing Maude Programs via Program Specialization.
Proceedings of the Analysis, Verification and Transformation for Declarative Programming and Intelligent Systems, 2023

2022
Symbolic Specialization of Rewriting Logic Theories with Presto.
Theory Pract. Log. Program., 2022

Optimization of rewrite theories by equational partial evaluation.
J. Log. Algebraic Methods Program., 2022

Order-sorted equational generalization algorithm revisited.
Ann. Math. Artif. Intell., 2022

An Efficient Canonical Narrowing Implementation for Protocol Analysis.
Proceedings of the Rewriting Logic and Its Applications - 14th International Workshop, 2022

Canonical Narrowing with Irreducibility and SMT Constraints as a Generic Symbolic Protocol Analysis Method.
Proceedings of the Rewriting Logic and Its Applications - 14th International Workshop, 2022

Parallel Maude-NPA for Cryptographic Protocol Analysis.
Proceedings of the Rewriting Logic and Its Applications - 14th International Workshop, 2022

Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

Variant-Based Equational Anti-unification.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2022

Hybrid Post-Quantum TLS formal specification in Maude-NPA - toward its security analysis.
Proceedings of the International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols co-located with the 23rd International Conference on Formal Engineering Methods (ICFEM 2022), 2022

Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude.
Proceedings of the International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols co-located with the 23rd International Conference on Formal Engineering Methods (ICFEM 2022), 2022

Canonical Narrowing for Variant-Based Conditional Rewrite Theories.
Proceedings of the Formal Methods and Software Engineering, 2022

Modeling and verification of the post-quantum key encapsulation mechanism KYBER using Maude.
Proceedings of the International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols co-located with the 23rd International Conference on Formal Engineering Methods (ICFEM 2022), 2022

Equational Unification and Matching, and Symbolic Reachability Analysis in Maude 3.2 (System Description).
Proceedings of the Automated Reasoning - 11th International Joint Conference, 2022

2021
Protocol Analysis with Time and Space.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Programming and symbolic computation in Maude.
J. Log. Algebraic Methods Program., 2020

A partial evaluation framework for order-sorted equational programs modulo axioms.
J. Log. Algebraic Methods Program., 2020

Order-sorted Homeomorphic Embedding Modulo Combinations of Associativity and/or Commutativity Axioms.
Fundam. Informaticae, 2020

Variant-based Equational Unification under Constructor Symbols.
Proceedings of the Proceedings 36th International Conference on Logic Programming (Technical Communications), 2020

Protocol Analysis with Time.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Symbolic Analysis of Maude Theories with Narval.
Theory Pract. Log. Program., 2019

Most General Variant Unifiers.
Proceedings of the Proceedings 35th International Conference on Logic Programming (Technical Communications), 2019

Strand Spaces with Choice via a Process Algebra Semantics.
CoRR, 2019

ACUOS<sup>2</sup>: A High-Performance System for Modular ACU Generalization with Subtyping and Inheritance.
Proceedings of the Logics in Artificial Intelligence - 16th European Conference, 2019

Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2018
Multi-paradigm Programming in Maude.
Proceedings of the Rewriting Logic and Its Applications - 12th International Workshop, 2018

Associative Unification and Symbolic Reasoning Modulo Associativity in Maude.
Proceedings of the Rewriting Logic and Its Applications - 12th International Workshop, 2018

Modular Verification of Sequential Composition for Private Channels in Maude-NPA.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018

Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA.
Proceedings of the LPAR-22. 22nd International Conference on Logic for Programming, 2018

Homeomorphic Embedding Modulo Combinations of Associativity and Commutativity Axioms.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2018

2017
Inspecting Maude variants with GLINTS.
Theory Pract. Log. Program., 2017

2016
Rewriting logic and its applications (extended selected papers from WRLA 2014).
J. Log. Algebraic Methods Program., 2016

Effective Sequential Protocol Composition in Maude-NPA.
CoRR, 2016

Strand spaces with choice via a process algebra semantics.
Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, 2016

Partial Evaluation of Order-Sorted Equational Programs Modulo Axioms.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2016

Built-in Variant Generation and Unification, and Their Applications in Maude 2.7.
Proceedings of the Automated Reasoning - 8th International Joint Conference, 2016

2015
Constrained narrowing for conditional equational theories modulo axioms.
Sci. Comput. Program., 2015

Analysis of the PKCS#11 API Using the Maude-NPA Tool.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

Two Decades of Maude.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

2014
State space reduction in the Maude-NRL Protocol Analyzer.
Inf. Comput., 2014

Functional and (Constraint) Logic Programming.
Inf. Comput., 2014

A modular order-sorted equational generalization algorithm.
Inf. Comput., 2014

A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Analysis of the IBM CCA Security API Protocols in Maude-NPA.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Theories of Homomorphic Encryption, Unification, and the Finite Variant Property.
Proceedings of the 16th International Symposium on Principles and Practice of Declarative Programming, 2014

ACUOS: A System for Modular ACU Generalization with Subtyping and Inheritance.
Proceedings of the Logics in Artificial Intelligence - 14th European Conference, 2014

A rewriting-based forwards semantics for Maude-NPA.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Functional Logic Programming in Maude.
Proceedings of the Specification, Algebra, and Software, 2014

2013
Unification and Anti-unification modulo Equational Theories.
Proceedings of the 27th International Workshop on Unification, 2013

Abstract Logical Model Checking of Infinite-State Systems Using Narrowing.
Proceedings of the 24th International Conference on Rewriting Techniques and Applications, 2013

Detecting Modular ACU Structural Symmetries.
Proceedings of the 27th International Workshop on Unification, 2013

Incremental and Adaptive Software Systems Development of Natural Language Applications.
Proceedings of the Information System Development, 2013

Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
Proceedings of the Automated Deduction - CADE-24, 2013

2012
Folding variant narrowing and optimal variant termination.
J. Log. Algebraic Methods Program., 2012

Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions.
Proceedings of the Computer Security - ESORICS 2012, 2012

The use of types in designing unification algorithms: two case studies.
Proceedings of the UNIF 2012 Post-Worskhop Proceedings. The 26th International Workshop on Unification, 2012

2011
Modular termination of basic narrowing and equational unification.
Log. J. IGPL, 2011

Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
Proceedings of the 25th International Workshop on Unification, 2011

Variants, Unification, Narrowing, and Symbolic Reachability in Maude 2.6.
Proceedings of the 22nd International Conference on Rewriting Techniques and Applications, 2011

Protocol analysis in Maude-NPA using unification modulo homomorphic encryption.
Proceedings of the 13th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2011

2010
On-demand strategy annotations revisited: An improved on-demand evaluation strategy.
Theor. Comput. Sci., 2010

A compact fixpoint semantics for term rewriting systems.
Theor. Comput. Sci., 2010

Approximating Non-interference and Erasure in Rewriting Logic.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010

Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Sequential Protocol Composition in Maude-NPA.
Proceedings of the Computer Security, 2010

2009
Termination of narrowing revisited.
Theor. Comput. Sci., 2009

A Graphical User Interface for Maude-NPA.
Proceedings of the Ninth Spanish Conference on Programming and Languages, 2009

Unification and Narrowing in Maude 2.4.
Proceedings of the Rewriting Techniques and Applications, 20th International Conference, 2009

Abstract Certification of Global Non-interference in Rewriting Logic.
Proceedings of the Formal Methods for Components and Objects - 8th International Symposium, 2009

2008
Variant Narrowing and Equational Unification.
Proceedings of the Seventh International Workshop on Rewriting Logic and its Applications, 2008

Preface.
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008

Preface.
Proceedings of the 4th International Workshop on Automated Specification and Verification of Web Systems, 2008

Order-Sorted Generalization.
Proceedings of the 17th International Workshop on Functional and (Constraint) Logic Programming, 2008

A Tool for Automated Certification of Java Source Code in Maude.
Proceedings of the Eighth Spanish Conference on Programming and Computer Languages, 2008

Equational Unification by Variant Narrowing (Extended Abstract).
Proceedings of the 22nd International Workshop on Unification, 2008

Effectively Checking the Finite Variant Property.
Proceedings of the Rewriting Techniques and Applications, 19th International Conference, 2008

Modular Termination of Basic Narrowing.
Proceedings of the Rewriting Techniques and Applications, 19th International Conference, 2008

Directed-Logical Testing for Functional Verification of Microprocessors.
Proceedings of the 6th ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2008), 2008

A Modular Equational Generalization Algorithm.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2008

Termination of Narrowing Using Dependency Pairs.
Proceedings of the Logic Programming, 24th International Conference, 2008

Automated Certification of Non-Interference in Rewriting Logic.
Proceedings of the Formal Methods for Industrial Critical Systems, 2008

State Space Reduction in the Maude-NRL Protocol Analyzer.
Proceedings of the Computer Security, 2008

2007
Removing redundant arguments automatically.
Theory Pract. Log. Program., 2007

Preface.
Proceedings of the 3rd International Workshop on Automated Specification and Verification of Web Systems, 2007

Symbolic Model Checking of Infinite-State Systems Using Narrowing.
Proceedings of the Term Rewriting and Applications, 18th International Conference, 2007

Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties.
Proceedings of the Foundations of Security Analysis and Design V, 2007

Automatic Certification of Java Source Code in Rewriting Logic.
Proceedings of the Formal Methods for Industrial Critical Systems, 2007

2006
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties.
Theor. Comput. Sci., 2006

Narrowing and Rewriting Logic: from Foundations to Applications.
Proceedings of the 15th Workshop on Functional and (Constraint) Logic Programming, 2006

Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer.
Proceedings of the First International Workshop on Security and Rewriting Techniques, 2006

2005
Preface.
Proceedings of the International Workshop on Automated Specification and Verification of Web Sites, 2005

Natural Narrowing for General Term Rewriting Systems.
Proceedings of the Term Rewriting and Applications, 16th International Conference, 2005

A rewriting-based inference system for the NRL protocol analyzer: grammar generation.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

2004
On-demand Evaluation for Maude.
Proceedings of the 5th International Workshop on Rule-Based Programming, 2004

New Evaluation Commands for Maude Within Full Maude.
Proceedings of the Fifth International Workshop on Rewriting Logic and Its Applications, 2004

Thesis: Strategies and analysis techniques in functional program optimization.
AI Commun., 2004

Natural Rewriting for General Term Rewriting Systems.
Proceedings of the Logic Based Program Synthesis and Transformation, 2004

Implementing Natural Rewriting and Narrowing Efficiently.
Proceedings of the Functional and Logic Programming, 7th International Symposium, 2004

2003
On-demand Evaluation by Program Transformation.
Proceedings of the 4th International Workshop on Rule-Based Programming, 2003

OnDemandOBJ: A Laboratory for Strategy Annotations.
Proceedings of the 4th International Workshop on Rule-Based Programming, 2003

Abstract correction of first-order functional programs.
Proceedings of the 12th International Workshop on Functional and Constraint Logic Programming, 2003

Refining weakly outermost-needed rewriting and narrowing.
Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2003

Abstract Correction of OBJ-like Programs.
Proceedings of the 2003 Joint Conference on Declarative Programming, 2003

2002
Correct and Complete (Positive) Strategy Annotations for OBJ.
Proceedings of the Fourth International Workshop on Rewriting logic and Its Applications, 2002

Redundancy of Arguments Reduced to Induction.
Proceedings of the 11th International Workshop on Functional and (Constraint) Logic Programming, 2002

Improving On-Demand Strategy Annotations.
Proceedings of the Logic for Programming, 2002

Abstract Diagnosis of Functional Programs.
Proceedings of the Logic Based Program Synthesis and Tranformation, 2002

Removing Redundant Arguments of Functions.
Proceedings of the Algebraic Methodology and Software Technology, 2002

2000
Redundancy Analyses in Term Rewriting.
Proceedings of the 9th International Workshop on Functional and Logic Programming, 2000

1999
UPV-CURRY: An Incremental CURRY Interpreter.
Proceedings of the SOFSEM '99, Theory and Practice of Informatics, 26th Conference on Current Trends in Theory and Practice of Informatics, Milovy, Czech Republic, November 27, 1999

An Incremental Needed Narrowing Calculus for Curry.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999


  Loading...