Security properties of cryptographic protocols are typically expressed as reachability or equivalence properties. Secrecy and authentication are examples of reachability properties while privacy properties such as untraceability, vote secrecy, or anonymity are generally expressed as behavioural equivalence in a process algebra that models security protocols. Our main contribution is to reduce the search space for attacks for reachability as well as equivalence properties. Specically, we show that if there is an attack then there is one that is well-typed. Our result holds for a large class of typing systems, a family of equational theories that encompasses all standard primitives, and a large class of deterministic security protocols. For m...
Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed u...
International audienceRecently, many tools have been proposed for automatically analysing, in symbol...
This thesis studies the analysis of cryptographic protocols. They are sequences of instructions perm...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
International audienceSecurity properties of cryptographic protocols are typically expressed as reac...
Our first main contribution is to reduce the search space for attacks. Specifically, we show that if...
Abstract. Privacy properties such as untraceability, vote secrecy, or anonymity are typically expres...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
Many tools have been developed to automatically verify security properties on cryptographic protocol...
International audienceVerification of privacy-type properties for cryptographic protocols in an acti...
International audienceFormal methods have been very successful in analyzing security protocols for r...
We identify a new decidable class of security protocols, both for reachability and equivalence prope...
Verification of privacy-type properties for cryptographic protocols in an active adversarial environ...
The verification of the cryptographic protocols ensures that there is not possible attack during an ...
Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed u...
International audienceRecently, many tools have been proposed for automatically analysing, in symbol...
This thesis studies the analysis of cryptographic protocols. They are sequences of instructions perm...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
International audienceSecurity properties of cryptographic protocols are typically expressed as reac...
Our first main contribution is to reduce the search space for attacks. Specifically, we show that if...
Abstract. Privacy properties such as untraceability, vote secrecy, or anonymity are typically expres...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
Many tools have been developed to automatically verify security properties on cryptographic protocol...
International audienceVerification of privacy-type properties for cryptographic protocols in an acti...
International audienceFormal methods have been very successful in analyzing security protocols for r...
We identify a new decidable class of security protocols, both for reachability and equivalence prope...
Verification of privacy-type properties for cryptographic protocols in an active adversarial environ...
The verification of the cryptographic protocols ensures that there is not possible attack during an ...
Privacy-type properties such as vote secrecy, anonymity, or untraceability are typically expressed u...
International audienceRecently, many tools have been proposed for automatically analysing, in symbol...
This thesis studies the analysis of cryptographic protocols. They are sequences of instructions perm...