Abstract. Many recent results are concerned with interpreting proofs of security done in symbolic models in the more detailed models of computational cryptog-raphy. In the case of symmetric encryption, these results stringently demand that no key cycle (e.g. {k}k) can be produced during the execution of protocols. While security properties like secrecy or authentication have been proved decidable for many interesting classes of protocols, the automatic detection of key cycles has not been studied so far. In this paper, we prove that deciding the existence of key-cycles is NP-complete for a bounded number of sessions. Next, we observe that the techniques that we use are of more general interest and apply them to reprove the decidability of a...
International audienceRecently, Bana and Comon-Lundh introduced the notion of computationally comple...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
International audienceThere is a large amount of work dedicated to the formal verification of securi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
International audienceThe design and verification of cryptographic protocols is a notoriously diffic...
International audienceGiven the central importance of designing secure protocols, providing solid ma...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We develop a compositional method for proving cryptographically sound security properties of key exc...
We present an approach to automating computationally sound\ud proofs of key exchange protocols based...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
We develop a compositional method for proving cryptographically sound security properties of key exc...
We investigate the applicability of symbolic exploration to the automatic verification of secrecy an...
Abstract. Symbolic and computational models are the two families of models for rigorously analysing ...
International audienceRecently, Bana and Comon-Lundh introduced the notion of computationally comple...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
International audienceThere is a large amount of work dedicated to the formal verification of securi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
International audienceThe design and verification of cryptographic protocols is a notoriously diffic...
International audienceGiven the central importance of designing secure protocols, providing solid ma...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We develop a compositional method for proving cryptographically sound security properties of key exc...
We present an approach to automating computationally sound\ud proofs of key exchange protocols based...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
We develop a compositional method for proving cryptographically sound security properties of key exc...
We investigate the applicability of symbolic exploration to the automatic verification of secrecy an...
Abstract. Symbolic and computational models are the two families of models for rigorously analysing ...
International audienceRecently, Bana and Comon-Lundh introduced the notion of computationally comple...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...