International audienceRecently, many tools have been proposed for automatically analysing, in symbolic models, equivalence of security protocols. Equivalence is a property needed to state privacy properties or game-based properties like strong secrecy. Tools for a bounded number of sessions can decide equivalence but typically suffer from efficiency issues. Tools for an unbounded number of sessions like Tamarin or ProVerif prove a stronger notion of equivalence (diff-equivalence) that does not properly handle protocols with else branches. Building upon a recent approach, we propose a type system for reasoning about branching protocols and dynamic keys. We prove our type system to entail equivalence , for all the standard primitives. Our typ...
We consider security properties of cryptographic protocols, that are either trace properties (such a...
This thesis presents methods to verify cryptographic protocolsin the symbolic model: formal methods ...
This paper presents APTE, a new tool for automatically proving the security of cryptographic protoco...
Our first main contribution is to reduce the search space for attacks. Specifically, we show that if...
We identify a new decidable class of security protocols, both for reachability and equivalence prope...
International audienceMature push button tools have emerged for checking trace properties (e.g. secr...
International audienceWe consider security properties of cryptographic protocols that can be modelle...
The original publication is available at www.springerlink.comInternational audienceIndistinguishabil...
International audienceVerification of privacy-type properties for cryptographic protocols in an acti...
Verification of privacy-type properties for cryptographic protocols in an active adversarial environ...
Indistinguishability properties are essential in formal verification of cryptographic protocols. The...
In this paper we present an extension of the AKISS protocol verification tool which allows to verify...
Abstract. Privacy properties such as untraceability, vote secrecy, or anonymity are typically expres...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
We consider security properties of cryptographic protocols, that are either trace properties (such a...
This thesis presents methods to verify cryptographic protocolsin the symbolic model: formal methods ...
This paper presents APTE, a new tool for automatically proving the security of cryptographic protoco...
Our first main contribution is to reduce the search space for attacks. Specifically, we show that if...
We identify a new decidable class of security protocols, both for reachability and equivalence prope...
International audienceMature push button tools have emerged for checking trace properties (e.g. secr...
International audienceWe consider security properties of cryptographic protocols that can be modelle...
The original publication is available at www.springerlink.comInternational audienceIndistinguishabil...
International audienceVerification of privacy-type properties for cryptographic protocols in an acti...
Verification of privacy-type properties for cryptographic protocols in an active adversarial environ...
Indistinguishability properties are essential in formal verification of cryptographic protocols. The...
In this paper we present an extension of the AKISS protocol verification tool which allows to verify...
Abstract. Privacy properties such as untraceability, vote secrecy, or anonymity are typically expres...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
We consider security properties of cryptographic protocols, that are either trace properties (such a...
This thesis presents methods to verify cryptographic protocolsin the symbolic model: formal methods ...
This paper presents APTE, a new tool for automatically proving the security of cryptographic protoco...