Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols