Abstract. Intuitively, two protocols P1 and P2 are indistinguishable if an attacker cannot tell the difference between interactions with P1 and with P2. In this paper we: (i) propose an intuitive notion of indistinguishability in Maude-NPA; (ii) formalize such a notion in terms of state unreachability conditions on their synchronous product; (iii) prove theorems showing how -assuming the protocol's algebraic theory has a finite variant (FV) decomposition-these conditions can be checked by the Maude-NPA tool; and (iv) illustrate our approach with concrete examples. This provides for the first time a framework for automatic analysis of indistinguishability modulo as wide a class of algebraic properties as FV, which includes many associat...
International audienceIn formal approaches, messages sent over a network are usu- ally modeled by te...
Since 1981, a large variety of formal methods for the analysis of cryptographic protocols has evolve...
International audienceIn the last decade, formal methods have proved their interest when analyzing s...
The area of formal analysis of cryptographic protocols has been an active one since the mid 80’s. T...
Formal methods have been used in analyzing cryptographic protocols since the 1980’s. Formal analysis...
There is a growing interest in formal methods and tools to analyze cryptographic protocols modulo al...
International audienceComputational indistinguishability is a key property in cryptography and verif...
AbstractThe NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of crypt...
Cette thèse s'inscrit dans le domaine de la vérification de protocoles cryptographiques dans le modè...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
We consider the problem of computational indistinguishability of protocols. We design a symbolic mod...
Many formal techniques for the verification of cryptographic protocols rely on the abstract definiti...
International audienceWe consider the problem of computational indistinguishability of protocols. We...
International audienceThere are two main frameworks for analyzing cryptographic systems; the symboli...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
International audienceIn formal approaches, messages sent over a network are usu- ally modeled by te...
Since 1981, a large variety of formal methods for the analysis of cryptographic protocols has evolve...
International audienceIn the last decade, formal methods have proved their interest when analyzing s...
The area of formal analysis of cryptographic protocols has been an active one since the mid 80’s. T...
Formal methods have been used in analyzing cryptographic protocols since the 1980’s. Formal analysis...
There is a growing interest in formal methods and tools to analyze cryptographic protocols modulo al...
International audienceComputational indistinguishability is a key property in cryptography and verif...
AbstractThe NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of crypt...
Cette thèse s'inscrit dans le domaine de la vérification de protocoles cryptographiques dans le modè...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
We consider the problem of computational indistinguishability of protocols. We design a symbolic mod...
Many formal techniques for the verification of cryptographic protocols rely on the abstract definiti...
International audienceWe consider the problem of computational indistinguishability of protocols. We...
International audienceThere are two main frameworks for analyzing cryptographic systems; the symboli...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
International audienceIn formal approaches, messages sent over a network are usu- ally modeled by te...
Since 1981, a large variety of formal methods for the analysis of cryptographic protocols has evolve...
International audienceIn the last decade, formal methods have proved their interest when analyzing s...