In many cryptographic protocols, the actions performed by principals are iterative processes. However, in contrast to other classes of protocols, only very little is known about deciding the security of such protocols. To analyze decidability for these protocols, we propose a protocol model in which the actions of principals are described by tree transducers with regular look-ahead. The main result is that security in this model is decidable and EXPTIME-hard in presence of the standard Dolev-Yao intruder
International audienceWe address the proof-based development of cryptographic protocols satisfying s...
On a case study, we present a new approach for verifying cryptographic protocols, based on rewriting...
AbstractCryptographic protocols have so far been analyzed for the most part by means of testing (whi...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
AbstractThis paper extends a rewriting approximations-based theoretical framework in which the secur...
Formal analysis of cryptographic protocols has mainly concentrated on protocols with closed-ended d...
International audienceThis paper extends a rewriting approximations-based theoretical framework in w...
International audienceThis paper extends a rewriting approximations-based theoretical framework in w...
AbstractCryptographic protocols have so far been analyzed for the most part by means of testing (whi...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
International audienceWe address the proof-based development of cryptographic protocols satisfying s...
On a case study, we present a new approach for verifying cryptographic protocols, based on rewriting...
AbstractCryptographic protocols have so far been analyzed for the most part by means of testing (whi...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
AbstractThis paper extends a rewriting approximations-based theoretical framework in which the secur...
Formal analysis of cryptographic protocols has mainly concentrated on protocols with closed-ended d...
International audienceThis paper extends a rewriting approximations-based theoretical framework in w...
International audienceThis paper extends a rewriting approximations-based theoretical framework in w...
AbstractCryptographic protocols have so far been analyzed for the most part by means of testing (whi...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
International audienceWe address the proof-based development of cryptographic protocols satisfying s...
On a case study, we present a new approach for verifying cryptographic protocols, based on rewriting...
AbstractCryptographic protocols have so far been analyzed for the most part by means of testing (whi...