In this work, we present an algebraic approach for modeling the two-party cascade protocol of Dolev-Yao and for fully formalizing its security in the specification language of the Prototype Verification System PVS. Although cascade protocols could be argued to be a very limited model, it should be stressed here that they are the basis of more sophisticated protocols of great applicability, such as those which allow treatment of multiparty, tuples, nonces, name-stamps, signatures, etc. In the current algebraic approach, steps of the protocol are modeled in a monoid freely generated by the cryptographic operators. Words in this monoid are specified as finite sequences and the whole protocol as a finite sequence of protocol steps, that are fun...
The verification of the cryptographic protocols ensures that there is not possible attack during an ...
In this paper we investigate the applicability of a bottom-up evaluation strategy for a first-order ...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
In this work, we present an algebraic approach for modeling the two-party cascade protocol of Dolev-...
AbstractTwo-party communication protocols for public-key cryptosystems are studied. The formal model...
The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic ...
International audienceWe address the proof-based development of cryptographic protocols satisfying s...
AbstractCharacterizations of secure multi-party symmetric and nonsymmetric cascade protocols are giv...
International audienceGiven the central importance of designing secure protocols, providing solid ma...
This paper presents an application of PVS to the verification of security protocols. The objective i...
Dolev and Yao initiated an approach to studying crypto-graphic protocols which abstracts from possib...
AbstractDolev and Yao (1983) developed an elegant characterization of two-party cascade protocols th...
19 pagesRapport interneIn this paper we propose a general definition of secrecy for cryptographic pr...
The verification of the cryptographic protocols ensures that there is not possible attack during an ...
In this paper we investigate the applicability of a bottom-up evaluation strategy for a first-order ...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
In this work, we present an algebraic approach for modeling the two-party cascade protocol of Dolev-...
AbstractTwo-party communication protocols for public-key cryptosystems are studied. The formal model...
The main result of this paper is that the Dolev-Yao model is a safe abstraction of the computational...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic ...
International audienceWe address the proof-based development of cryptographic protocols satisfying s...
AbstractCharacterizations of secure multi-party symmetric and nonsymmetric cascade protocols are giv...
International audienceGiven the central importance of designing secure protocols, providing solid ma...
This paper presents an application of PVS to the verification of security protocols. The objective i...
Dolev and Yao initiated an approach to studying crypto-graphic protocols which abstracts from possib...
AbstractDolev and Yao (1983) developed an elegant characterization of two-party cascade protocols th...
19 pagesRapport interneIn this paper we propose a general definition of secrecy for cryptographic pr...
The verification of the cryptographic protocols ensures that there is not possible attack during an ...
In this paper we investigate the applicability of a bottom-up evaluation strategy for a first-order ...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...