Abstract. The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence depends on an underlying equational theory. The choice of an inappropriate equational theory can lead to overly pessimistic or overly optimistic notions of indistinguishability, and in turn to security criteria that require protection against impossible attacks or—worse yet—that ignore feasible ones. In this paper, we define and justify an equational theory for standard, fundamental cryptographic operations. This equational theory yields a notion of static equivalence that implies computational indistinguishability. Static equivalence remains liberal enough...
The work of Abadi and Fournet introduces the notion of a frame to describe the knowledge of the envi...
Although various past eorts have been made to character-ize and detect guessing attacks, there is no...
AbstractThe work of Abadi and Fournet introduces the notion of a frame to describe the knowledge of ...
1 Introduction In the past few years, significant effort has been made to link formal and compu-tati...
International audienceIn this paper we study the link between formal and cryptographic models for se...
Abstract. We consider two standard notions in formal security pro-tocol analysis: message deducibili...
AbstractIn this paper we study the link between formal and cryptographic models for security protoco...
International audienceThere are two main frameworks for analyzing cryptographic systems; the symboli...
International audienceStatic equivalence is a well established notion of indistinguishability of seq...
AbstractThere are two main ways of defining secrecy of cryptographic protocols. The first version ch...
Abstract. We define a framework to reason about implementations of equational theories in the presen...
We define a framework to reason about sound implementations of equational theories in the presence o...
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if ...
Although various past efforts have been made to character-ize and detect guessing attacks, there is ...
Guessing, or dictionary, attacks arise when an intruder exploits the fact that certain data like pas...
The work of Abadi and Fournet introduces the notion of a frame to describe the knowledge of the envi...
Although various past eorts have been made to character-ize and detect guessing attacks, there is no...
AbstractThe work of Abadi and Fournet introduces the notion of a frame to describe the knowledge of ...
1 Introduction In the past few years, significant effort has been made to link formal and compu-tati...
International audienceIn this paper we study the link between formal and cryptographic models for se...
Abstract. We consider two standard notions in formal security pro-tocol analysis: message deducibili...
AbstractIn this paper we study the link between formal and cryptographic models for security protoco...
International audienceThere are two main frameworks for analyzing cryptographic systems; the symboli...
International audienceStatic equivalence is a well established notion of indistinguishability of seq...
AbstractThere are two main ways of defining secrecy of cryptographic protocols. The first version ch...
Abstract. We define a framework to reason about implementations of equational theories in the presen...
We define a framework to reason about sound implementations of equational theories in the presence o...
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if ...
Although various past efforts have been made to character-ize and detect guessing attacks, there is ...
Guessing, or dictionary, attacks arise when an intruder exploits the fact that certain data like pas...
The work of Abadi and Fournet introduces the notion of a frame to describe the knowledge of the envi...
Although various past eorts have been made to character-ize and detect guessing attacks, there is no...
AbstractThe work of Abadi and Fournet introduces the notion of a frame to describe the knowledge of ...