In this thesis we introduce the alternating mu-calculus (AMC) for cryptographic protocols and show in which cases this logic is decidable and in which cases it is not. We also give tight complexity bounds for the decidable classes of this problem. We extend the constraint solving approach developed for reachability properties to strategy properties and show how to utilize existing constraint solvers as a black box to decide strategy properties when a bounded number of sessions is considered and no bound on the message length is imposed. We give an alternative proof of the impossibility result given by Chadha et~al. based on an axiomatic approach. In order to formulate the properties of protocols we extend ATL by what we call move sele...
Cryptographic protocols are small concurrent programs designed to guarantee the security of exchange...
We propose a protocol model in which principals are described by transducers (Mealy machines), i.e.,...
In this work, we investigate the security of interactive computations. The main emphasis is on the m...
We propose a new, widely applicable model for analyzing knowledge-based (epistemic) and strategic pr...
Only very little is known about the automatic analysis of cryptographic protocols for game-theoretic...
Formal models for security protocols often rely on assumptions not to be found in computational mode...
International audienceCryptographic protocols are successfully analyzed using formal methods. Howeve...
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cry...
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reac...
In recent years, formal methods have been developed to analyze and verify cryptographic protocols. W...
We report on our research on proving the security of multi-party cryptographic protocols using the E...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
We identify a new decidable class of security protocols, both for reachability and equivalence prope...
We expound a method of analyzing cryptographic protocols using geometric logic and the Chase. Geomet...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
Cryptographic protocols are small concurrent programs designed to guarantee the security of exchange...
We propose a protocol model in which principals are described by transducers (Mealy machines), i.e.,...
In this work, we investigate the security of interactive computations. The main emphasis is on the m...
We propose a new, widely applicable model for analyzing knowledge-based (epistemic) and strategic pr...
Only very little is known about the automatic analysis of cryptographic protocols for game-theoretic...
Formal models for security protocols often rely on assumptions not to be found in computational mode...
International audienceCryptographic protocols are successfully analyzed using formal methods. Howeve...
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cry...
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reac...
In recent years, formal methods have been developed to analyze and verify cryptographic protocols. W...
We report on our research on proving the security of multi-party cryptographic protocols using the E...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
We identify a new decidable class of security protocols, both for reachability and equivalence prope...
We expound a method of analyzing cryptographic protocols using geometric logic and the Chase. Geomet...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
Cryptographic protocols are small concurrent programs designed to guarantee the security of exchange...
We propose a protocol model in which principals are described by transducers (Mealy machines), i.e.,...
In this work, we investigate the security of interactive computations. The main emphasis is on the m...