Dolev and Yao initiated an approach to studying crypto-graphic protocols which abstracts from possible problems with the cryptography so as to focus on the structural as-pects of the protocol. Recent work in this framework has developed easily applicable methods to determine many se-curity properties of protocols. A separate line of work, initi-ated by Bellare and Rogaway, analyzes the way specic cryp-tographic primitives are used in protocols. It gives asymp-totic bounds on the risk of failures of secrecy or authentica-tion. In this paper we show how the Dolev-Yao model may be used for protocol analysis, while a further analysis gives a quantitative bound on the extent to which real crypto-graphic primitives may diverge from the idealized ...
peer-reviewedThe Dolev-Yao model has been widely used in protocol verificaion and has been impleme...
We consider the so called "cryptographic protocols" whose aim is to ensure some security properties ...
We present a new technique for verifying authenticity in cryptographic protocols. This technique is ...
We develop informal principals and formal rules to verify security properties in cryptographic proto...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
We advocate here the use of two authentication primitives we recently propose in a calculus for dist...
authenticated key agreement construct a shared secret with a peer using a minimum of communication a...
We use two authentication primitives proposed recently as a linguistic support for enforcing auth...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
The verification of the cryptographic protocols ensures that there is not possible attack during an ...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational...
In this paper, we examine current approaches and the state of the art in the application of formal m...
We use two authentication primitives proposed recently as a linguistic support for enforcing authent...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
peer-reviewedThe Dolev-Yao model has been widely used in protocol verificaion and has been impleme...
We consider the so called "cryptographic protocols" whose aim is to ensure some security properties ...
We present a new technique for verifying authenticity in cryptographic protocols. This technique is ...
We develop informal principals and formal rules to verify security properties in cryptographic proto...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
We advocate here the use of two authentication primitives we recently propose in a calculus for dist...
authenticated key agreement construct a shared secret with a peer using a minimum of communication a...
We use two authentication primitives proposed recently as a linguistic support for enforcing auth...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
The verification of the cryptographic protocols ensures that there is not possible attack during an ...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational...
In this paper, we examine current approaches and the state of the art in the application of formal m...
We use two authentication primitives proposed recently as a linguistic support for enforcing authent...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
peer-reviewedThe Dolev-Yao model has been widely used in protocol verificaion and has been impleme...
We consider the so called "cryptographic protocols" whose aim is to ensure some security properties ...
We present a new technique for verifying authenticity in cryptographic protocols. This technique is ...