Modern security protocols may involve humans in order to compare or copy short strings betweendifferent devices. Multi-factor authentication protocols, such as Google 2-factor or 3D-Secure are typical examplesof such protocols. However, such short strings may be subject to brute force attacks. In this thesis we propose asymbolic model which includes attacker capabilities for both guessing short strings, and producing collisions whenshort strings result from an application of weak hash functions. We propose a new decision procedure for analyzing(a bounded number of sessions of) protocols that rely on short strings. The procedure has been integrated in theAKISS tool and tested protocols from the ISO/IEC 9798-6:2010 standardLes protocoles de s...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
La carte à puce, comme tout autre processeur de traitement d'informations confidentielles peut faire...
Authenticated key exchange is probably the most widely deployed asymmetric cryptographic primitive, ...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Security is a crucial requirement in the applications based on information and communication technol...
Modern cryptography relies on the notion of computational security. The level of security given by a...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
In recent years, the concern for privacy has significantly grown. This is a consequence of the regul...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
National audienceTreeSync est un sous-protocole d'authentification pour MLS, un protocole de message...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
La carte à puce, comme tout autre processeur de traitement d'informations confidentielles peut faire...
Authenticated key exchange is probably the most widely deployed asymmetric cryptographic primitive, ...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Security is a crucial requirement in the applications based on information and communication technol...
Modern cryptography relies on the notion of computational security. The level of security given by a...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
In recent years, the concern for privacy has significantly grown. This is a consequence of the regul...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
National audienceTreeSync est un sous-protocole d'authentification pour MLS, un protocole de message...
For modern cryptography, the security of a system is defined as the sum of the resources required to...
La carte à puce, comme tout autre processeur de traitement d'informations confidentielles peut faire...
Authenticated key exchange is probably the most widely deployed asymmetric cryptographic primitive, ...