AbstractThe spi-calculus is a variant of the polyadic π-calculus that admits symmetric cryptography and that admits expressing communication protocols in a precise though still abstract way. This paper shows that context-independent control flow analysis can be calculated in cubic time despite the fact that the spi-calculus operates over an infinite universe of values. Our approach is based on Horn Clauses with Sharing and we develop transformations to pass from the infinite to the finite and to deal with the polyadic nature of input and output. We prove that this suffices for obtaining a cubic time implementation without sacrificing precision and without making simplifying assumptions on the nature of keys
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
It is known that a static analysis of pi-calculus can be done rather simply and also efficiently, i....
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
The spi-calculus is a variant of the polyadic π-calculus that admits symmetric cryp-tography and tha...
AbstractThe spi-calculus is a variant of the polyadic π-calculus that admits symmetric cryptography ...
Abstract. It is well-known that context-independent control flow anal-ysis can be performed in cubic...
Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptogra...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
Abstract. It is well-known that context-independent control flow anal-ysis can be performed in cubic...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and a...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
The spi calculus is an executable model for the description and analysis of cryptographic protocols....
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At t...
The spi calculus is a process algebra used to model cryptographic protocols. A process calculus is a...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
It is known that a static analysis of pi-calculus can be done rather simply and also efficiently, i....
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
The spi-calculus is a variant of the polyadic π-calculus that admits symmetric cryp-tography and tha...
AbstractThe spi-calculus is a variant of the polyadic π-calculus that admits symmetric cryptography ...
Abstract. It is well-known that context-independent control flow anal-ysis can be performed in cubic...
Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptogra...
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
Abstract. It is well-known that context-independent control flow anal-ysis can be performed in cubic...
We introduce the νspi-calculus that strengthens the notion of “perfect symmetric cryptography” of th...
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and a...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
The spi calculus is an executable model for the description and analysis of cryptographic protocols....
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At t...
The spi calculus is a process algebra used to model cryptographic protocols. A process calculus is a...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
It is known that a static analysis of pi-calculus can be done rather simply and also efficiently, i....
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...