Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the context of a recent line of research that aims to justify symbolic models in terms of more concrete, computational ones. We offer two models for reasoning about the concurrent use of symmetric, asymmetric, and passwordbased encryption in protocol messages. In each of the models we define a notion of equivalence between messages and also characterize when passwords are used securely in a message or in a set of messages. Our new definition for the computational security of password-based encryption may be of independent interest. The main results of this paper are two s...
International audienceWe consider the question of the adequacy of symbolic models versus computation...
International audienceWe show that the recent technique of computationally complete symbolic attacke...
Recently, we proposed a technique [1] to define a com-putationally complete symbolic attacker for th...
Abstract. Symbolic and computational models are the two families of models for rigorously analysing ...
International audienceSince the 1980s, two approaches have been developed for analyzing security pro...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the app...
International audienceRecently, Bana and Comon-Lundh introduced the notion of computationally comple...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
Formalization and modeling are important topics in cryptography. They are crucial for precisely def...
Security protocols are short programs that aim at securing communication over a public network. Thei...
Abstract Formal and symbolic techniques are extremely useful for modelling and analysing security pr...
Formal analysis of security protocols based on symbolic mod-els has been very successful in finding ...
We consider the problem of computational indistinguishability of protocols. We design a symbolic mod...
Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. Th...
Security protocols are short programs aiming at securing communications over a network. They are wid...
International audienceWe consider the question of the adequacy of symbolic models versus computation...
International audienceWe show that the recent technique of computationally complete symbolic attacke...
Recently, we proposed a technique [1] to define a com-putationally complete symbolic attacker for th...
Abstract. Symbolic and computational models are the two families of models for rigorously analysing ...
International audienceSince the 1980s, two approaches have been developed for analyzing security pro...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the app...
International audienceRecently, Bana and Comon-Lundh introduced the notion of computationally comple...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
Formalization and modeling are important topics in cryptography. They are crucial for precisely def...
Security protocols are short programs that aim at securing communication over a public network. Thei...
Abstract Formal and symbolic techniques are extremely useful for modelling and analysing security pr...
Formal analysis of security protocols based on symbolic mod-els has been very successful in finding ...
We consider the problem of computational indistinguishability of protocols. We design a symbolic mod...
Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. Th...
Security protocols are short programs aiming at securing communications over a network. They are wid...
International audienceWe consider the question of the adequacy of symbolic models versus computation...
International audienceWe show that the recent technique of computationally complete symbolic attacke...
Recently, we proposed a technique [1] to define a com-putationally complete symbolic attacker for th...