Exhaustive state-space exploration is a powerful approach to automated verification of authentication and key establishment protocols. However, correctness of such protocols is typically expressed as properties (requirements) that must hold even in systems in which there are an unbounded number of (potentially concurrent) runs of the protocol, and in which an adversary can perform an unbounded number of decryptions while eavesdropping and an unbounded number of encryptions (and other operations) while fabricating messages. Therefore, reduction theorems are needed, which show that if the required properties hold in a system with certain finite bounds on these parameters, then the properties hold in the unbounded system as well. We prove redu...
Electronic payment protocols are designed to work correctly in the presence of an adversary that can...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Protocols in electronic commerce and other securitysensitive applications require careful reasoning ...
Authentication protocols are designed to work correctly in the presence of an adversary that can pro...
International audienceBounding the number of sessions is a long-standing problem in the context of s...
Colloque avec actes et comité de lecture. internationale.International audienceWe present a new mode...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
International audienceFormal methods have been very successful in analyzing security protocols for r...
Article dans revue scientifique avec comité de lecture. internationale.International audienceWe pres...
We study the problem of analysing the security for an unbounded number of concurrent sessions of a c...
Abstract. Only very little is known about the automatic analysis of cryptographic protocols for game...
International audienceThere is a large amount of work dedicated to the formal verification of securi...
At NDSS 2012, Yan et al. analyzed the security of sev-eral challenge-response type user authenticati...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
In this thesis we introduce the alternating mu-calculus (AMC) for cryptographic protocols and show i...
Electronic payment protocols are designed to work correctly in the presence of an adversary that can...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Protocols in electronic commerce and other securitysensitive applications require careful reasoning ...
Authentication protocols are designed to work correctly in the presence of an adversary that can pro...
International audienceBounding the number of sessions is a long-standing problem in the context of s...
Colloque avec actes et comité de lecture. internationale.International audienceWe present a new mode...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
International audienceFormal methods have been very successful in analyzing security protocols for r...
Article dans revue scientifique avec comité de lecture. internationale.International audienceWe pres...
We study the problem of analysing the security for an unbounded number of concurrent sessions of a c...
Abstract. Only very little is known about the automatic analysis of cryptographic protocols for game...
International audienceThere is a large amount of work dedicated to the formal verification of securi...
At NDSS 2012, Yan et al. analyzed the security of sev-eral challenge-response type user authenticati...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
In this thesis we introduce the alternating mu-calculus (AMC) for cryptographic protocols and show i...
Electronic payment protocols are designed to work correctly in the presence of an adversary that can...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
Protocols in electronic commerce and other securitysensitive applications require careful reasoning ...