This paper presents an extension of the pi-calculus that can reason about brute force and guessing attacks. We relate new name declarations in the pi-calculus with random sampling in the computational model of security. The scope of a new name can then be expanded at a comparable cost as it would take to guess the randomly sampled value in the computational setting. We provide a syntax and reduction semantics for this system and a function that calculates the cost of a given attack, taking into account the ease with which the attacker can confirm their guesses
We devise an abstraction of zero-knowledge protocols that is accessible to a fully mechanized analys...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
AbstractWe study the security of password protocols against off-line dictionary attacks. In addition...
Abstract. We present a calculus for detecting guessing attacks, based on oracles that instantiate cr...
Guessing, or dictionary, attacks arise when an intruder exploits the fact that certain data like pas...
Although various past efforts have been made to character-ize and detect guessing attacks, there is ...
Although various past eorts have been made to character-ize and detect guessing attacks, there is no...
Abstract. We introduce a probabilistic framework for the automated analysis of security protocols. O...
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At t...
The security of systems is often predicated on a user or application selecting an object, a password...
Secure two-party computation allows two mutually distrusting parties to compute a function together,...
We present a name-passing calculus that can be regarded as a simplified pi-calculus equipped with a ...
We propose a probabilistic variant of the pi-calculus as a framework to specify randomized security ...
We propose an operational measure of information leakage in a non-stochastic setting to formalize pr...
This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a mor...
We devise an abstraction of zero-knowledge protocols that is accessible to a fully mechanized analys...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
AbstractWe study the security of password protocols against off-line dictionary attacks. In addition...
Abstract. We present a calculus for detecting guessing attacks, based on oracles that instantiate cr...
Guessing, or dictionary, attacks arise when an intruder exploits the fact that certain data like pas...
Although various past efforts have been made to character-ize and detect guessing attacks, there is ...
Although various past eorts have been made to character-ize and detect guessing attacks, there is no...
Abstract. We introduce a probabilistic framework for the automated analysis of security protocols. O...
We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At t...
The security of systems is often predicated on a user or application selecting an object, a password...
Secure two-party computation allows two mutually distrusting parties to compute a function together,...
We present a name-passing calculus that can be regarded as a simplified pi-calculus equipped with a ...
We propose a probabilistic variant of the pi-calculus as a framework to specify randomized security ...
We propose an operational measure of information leakage in a non-stochastic setting to formalize pr...
This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a mor...
We devise an abstraction of zero-knowledge protocols that is accessible to a fully mechanized analys...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
AbstractWe study the security of password protocols against off-line dictionary attacks. In addition...