Abstract. We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active attacks including concurrent protocol runs if it is implemented using provably secure cryptographic primitives. Although we achieve security under cryptographic definitions, our proof does not have to deal with probabilistic aspects of cryptography and is hence in the scope of current proof tools. The reason is that we exploit a recently proposed ideal cryptographic library, which has a provably secure cryptographic implementation. Together with composition and preservation theorems of the underlying model, this allows us to perform the actual proof effort i...
We develop an approach to deriving concrete engineering advice for cryptographic protocols from prov...
We develop a compositional method for proving cryptographically sound security properties of key exc...
In this work, we present an algebraic approach for modeling the two-party cascade protocol of Dolev-...
AbstractWe present the first cryptographically sound security proof of the well-known Otway-Rees pro...
Abstract. We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptogr...
19 pagesRapport interneIn this paper we propose a general definition of secrecy for cryptographic pr...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the app...
We present an approach to automating computationally sound\ud proofs of key exchange protocols based...
Informal justifications of security protocols involve arguing backwards that various events are impo...
Abstract. In the mid 1980s, Yao presented a constant-round protocol for securely computing any two-p...
We describe a faithful embedding of the Dolev-Yao model of Backes, Pfitzmann, and Waidner (CCS 2003)...
Provable security is a sub-discipline of cryptography that is used to demonstrate in a rigorous mann...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
In this work, we present an algebraic approach for modeling the two-party cascade protocol of Dolev-...
We develop an approach to deriving concrete engineering advice for cryptographic protocols from prov...
We develop a compositional method for proving cryptographically sound security properties of key exc...
In this work, we present an algebraic approach for modeling the two-party cascade protocol of Dolev-...
AbstractWe present the first cryptographically sound security proof of the well-known Otway-Rees pro...
Abstract. We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptogr...
19 pagesRapport interneIn this paper we propose a general definition of secrecy for cryptographic pr...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the app...
We present an approach to automating computationally sound\ud proofs of key exchange protocols based...
Informal justifications of security protocols involve arguing backwards that various events are impo...
Abstract. In the mid 1980s, Yao presented a constant-round protocol for securely computing any two-p...
We describe a faithful embedding of the Dolev-Yao model of Backes, Pfitzmann, and Waidner (CCS 2003)...
Provable security is a sub-discipline of cryptography that is used to demonstrate in a rigorous mann...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
In this work, we present an algebraic approach for modeling the two-party cascade protocol of Dolev-...
We develop an approach to deriving concrete engineering advice for cryptographic protocols from prov...
We develop a compositional method for proving cryptographically sound security properties of key exc...
In this work, we present an algebraic approach for modeling the two-party cascade protocol of Dolev-...