We investigate the contribution of cryptographic proofs of security to a systematic security engineering process. To this end we study how to model and prove security for concrete applications in three practical domains: computer networks, data outsourcing, and electronic voting. We conclude that cryptographic proofs of security can benefit a security engineering process in formulating requirements, influencing design, and identifying constraints for the implementation
This thesis proposes the use of provable encryption schemes to obtain end-to-end security of distrib...
In this work, we provide formal notions for different privacy goals of data outsourcing and establis...
This thesis proposes the use of provable encryption schemes to obtain end-to-end securityof distribu...
International audienceProvable security [6] is at the heart of modern cryptography. It advocates a m...
Security is one of the main issues of modern computer science. Nowadays more and more people use a c...
We rely on the security properties of cryptographic protocols every day while browsing the Internet ...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
The cryptographic methodology of formal security analysis usually works in three steps: choos...
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For...
Cryptographic protocols can be used to harden the security of IT systems, but only if these protocol...
Cryptographic protocols can be used to harden the security of IT systems, but only if these protocol...
Tamper-proof hardware has found its way into our everyday life in various forms, be it SIM cards, cr...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
International audienceSecurity protocols are short programs that aim at securing communication over ...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the app...
This thesis proposes the use of provable encryption schemes to obtain end-to-end security of distrib...
In this work, we provide formal notions for different privacy goals of data outsourcing and establis...
This thesis proposes the use of provable encryption schemes to obtain end-to-end securityof distribu...
International audienceProvable security [6] is at the heart of modern cryptography. It advocates a m...
Security is one of the main issues of modern computer science. Nowadays more and more people use a c...
We rely on the security properties of cryptographic protocols every day while browsing the Internet ...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
The cryptographic methodology of formal security analysis usually works in three steps: choos...
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For...
Cryptographic protocols can be used to harden the security of IT systems, but only if these protocol...
Cryptographic protocols can be used to harden the security of IT systems, but only if these protocol...
Tamper-proof hardware has found its way into our everyday life in various forms, be it SIM cards, cr...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
International audienceSecurity protocols are short programs that aim at securing communication over ...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the app...
This thesis proposes the use of provable encryption schemes to obtain end-to-end security of distrib...
In this work, we provide formal notions for different privacy goals of data outsourcing and establis...
This thesis proposes the use of provable encryption schemes to obtain end-to-end securityof distribu...