“…But finitary algorithms for theories E ∪ B not having the finite variant property, e.g., homomorphic encryption, are also supported by Maude-NPA. In this way, we have formally analyzed protocols of the form R = ( , E ∪B, R), where E ∪B can be a cryptographic theory involving a combination of functionalities such as: (i) encryption-decryption; (ii) bounded associativity; (iii) Diffie-Hellman exponentiation; (iv) exclusive or; and (v) homomorphic encryption [178,179,181,183,412]. In general, of course, protocol analysis with an unbounded number of sessions is undecidable.…”