Constraint Differentiation: Search-Space Reduction for the Constraint-Based Analysis of Security Protocols