References

  1. Charles André (2004): Computing SyncCharts Reactions. Electron. Notes Theor. Comput. Sci. 88, pp. 3–19, doi:10.1016/j.entcs.2003.05.007.
  2. Gérard Berry (2007): SCADE: Synchronous design and validation of embedded control software. In: Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems. Springer, pp. 19–33, doi:10.1109/5.97300.
  3. Gérard Berry & Georges Gonthier (1992): The Esterel Synchronous Programming Language: Design, Semantics, Implementation. Sci. Comput. Program. 19, pp. 87–152, doi:10.1016/0167-6423(92)90005-V.
  4. Jean-Louis Colaço, Bruno Pagano & Marc Pouzet (2017): SCADE 6: A formal language for embedded critical software development (invited paper). In: Frédéric Mallet, Min Zhang & Eric Madelaine: Proceedings of the 11th International Symposium on Theoretical Aspects of Software Engineering (TASE'17), Sophia Antipolis, France. IEEE Computer Society, pp. 1–11, doi:10.1109/TASE.2017.8285623.
  5. Donald W. Davies (1985): A Message Authenticator Algorithm Suitable for a Mainframe Computer. In: G. R. Blakley & David Chaum: Advances in Cryptology – Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (CRYPTO'84), Santa Barbara, CA, USA, Lecture Notes in Computer Science 196. Springer, pp. 393–400, doi:10.1007/3-540-39568-7_ 30.
  6. Donald W. Davies & David O. Clayden (1988): The Message Authenticator Algorithm (MAA) and its Implementation. NPL Report DITC 109/88. National Physical Laboratory, Teddington, Middlesex, UK.
  7. Hubert Garavel & Lina Marsso (2017): A Large Term Rewrite System Modelling a Pioneering Cryptographic Algorithm. In: Holger Hermanns & Peter Höfner: Proceedings of the 2nd Workshop on Models for Formal Analysis of Real Systems (MARS'17), Uppsala, Sweden, Electronic Proceedings in Theoretical Computer Science 244, pp. 129–183, doi:10.4204/EPTCS.244.6.
  8. Hubert Garavel & Lina Marsso (2018): Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm. In: Holger Hermanns & Peter Höfner: Proceedings of the 3nd Workshop on Models for Formal Analysis of Real Systems (MARS'18), Thessaloniki, Greece 268, pp. 41–87, doi:10.4204/EPTCS.268.2.
  9. Nicolas Halbwachs, Paul Caspi, Pascal Raymond & Daniel Pilaud (1991): The synchronous dataflow programming language Lustre. Proceedings of the IEEE 79(9), pp. 1305–1320, doi:10.1109/5.97300.
  10. ISO (1986): Requirements for Message Authentication (Wholesale). International Standard 8730. International Organization for Standardization – Banking, Geneva.
  11. ISO (1987): Approved Algorithms for Message Authentication – Part 1: Data Encryption Algorithm (DEA). International Standard 8731-1. International Organization for Standardization – Banking, Geneva.
  12. ISO (1990): Requirements for Message Authentication (Wholesale). International Standard 8730. International Organization for Standardization – Banking, Geneva.
  13. ISO (1992): Approved Algorithms for Message Authentication – Part 2: Message Authenticator Algorithm. International Standard 8731-2. International Organization for Standardization – Banking, Geneva.
  14. Erwan Jahier, Pascal Raymond & Philippe Baufreton (2006): Case studies with Lurette V2. International Journal on Software Tools for Technology Transfer 8(6), pp. 517–530, doi:10.1007/s10009-006-0023-9.
  15. M. K. F. Lai (1991): A Formal Interpretation of the MAA Standard in Z. NPL Report DITC 184/91. National Physical Laboratory, Teddington, Middlesex, UK.
  16. Alfred Menezes, Paul C. van Oorschot & Scott A. Vanstone (1996): Handbook of Applied Cryptography. CRC Press. Available from http://cacr.uwaterloo.ca/hac.
  17. Harold B. Munster (1991): Comments on the LOTOS Standard. NPL Technical Memorandum DITC 52/91. National Physical Laboratory, Teddington, Middlesex, UK.
  18. Harold B. Munster (1991): LOTOS Specification of the MAA Standard, with an Evaluation of LOTOS. NPL Report DITC 191/91. National Physical Laboratory, Teddington, Middlesex, UK. Available at ftp://ftp. inrialpes.fr/pub/vasy/publications/others/Munster-91-a.pdf.
  19. Graeme I. Parkin & G. O'Neill (1990): Specification of the MAA Standard in VDM. NPL Report DITC 160/90. National Physical Laboratory, Teddington, Middlesex, UK.
  20. Graeme I. Parkin & G. O'Neill (1991): Specification of the MAA Standard in VDM. In: Søren Prehn & W. J. Toetenel: Formal Software Development – Proceedings (Volume 1) of the 4th International Symposium of VDM Europe (VDM'91), Noordwijkerhout, The Netherlands, Lecture Notes in Computer Science 551. Springer, pp. 526–544, doi:10.1007/3-540-54834-3_ 31.
  21. Bart Preneel (2011): MAA. In: Henk C. A. van Tilborg & Sushil Jajodia: Encyclopedia of Cryptography and Security (2nd Edition). Springer, pp. 741–742, doi:10.1007/978-1-4419-5906-5_ 591.
  22. Bart Preneel & Paul C. van Oorschot (1996): On the Security of Two MAC Algorithms. In: Ueli M. Maurer: Advances in Cryptology – Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'96), Saragossa, Spain, Lecture Notes in Computer Science 1070. Springer, pp. 19–32, doi:10.1007/3-540-68339-9_ 3.
  23. Bart Preneel & Paul C. van Oorschot (1999): On the Security of Iterated Message Authentication Codes. IEEE Transactions on Information Theory 45(1), pp. 188–199, doi:10.1109/18.746787.
  24. Bart Preneel, Vincent Rumen & Paul C. van Oorschot (1997): Security Analysis of the Message Authenticator Algorithm (MAA). European Transactions on Telecommunications 8(5), pp. 455–470, doi:10.1002/ett.4460080504.
  25. Pascal Raymond, Yvan Roux & Erwan Jahier (2008): Lutin: a language for specifying and executing reactive scenarios. EURASIP Journal on Embedded Systems 2008, doi:10.1109/MS.2013.43.
  26. Vincent Rijmen, Bart Preneel & Erik De Win (1996): Key Recovery and Collision Clusters for MAA. In: Proceedings of the 1st International Conference on Security in Communication Networks (SCN'96).

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org