We present a new paradigm for unification arising out of a technique commonly used in cryptographic protocol analysis tools that employ unification modulo equational theories. This paradigm relies on: (i) a decomposition of an equational theory into (R, E) where R is conflu-ent, terminating, and coherent modulo E, and (ii) on reducing unification problems… (More)
We address a problem that arises in cryptographic protocol analysis when the equational properties of the cryptosystem are taken into account: in many situations it is necessary to guarantee that certain terms generated during a state exploration are in normal form with respect to the equational theory. We give a tool-independent methodology for state… (More)
A full version of this work  appeared in the proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoS-SaCS 2014). In the following, we provide a summary of this work.
was organized as a FLoC workshop hosted by RTA-TLCA and IJCAR, in the context of the Vienna Summer of Logic. UNIF is a well-established event with almost three decades of history. UNIF 2014 is the 28th event in a series of international meetings devoted to unification theory and its applications. Unification is concerned with the problem of identifying… (More)