The use of communication protocols has become pervasive at all levels of our society. Yet, their uses come with risks, either about the security of the system or the privacy of the user. To mitigate those risks, we must provide the protocols with strong security guarantees: we need formal, extensive, modular and machine-checked proofs. However, such proofs are very difficult to obtain in practice. In this Thesis, we strive to ease this process in the case of cryptographic protocols and powerful attackers. The four main contributions of this Thesis, all based on symbolic methods, are 1) a methodology for extensive analyses via a case study of multi-factor authentication; 2) composition results to allow modular proofs of complex protocols in ...
Notre société utilise de nombreux systèmes de communications. Parce que ces systèmes sont omniprésen...
Cette thèse est consacrée au problème de la vérification automatique des protocoles cryptographiques...
This thesis is dedicated to the automatic verification of cryptographic protocols in the logical and...
The use of communication protocols has become pervasive at all levels of our society. Yet, their use...
L'utilisation des protocoles de communication est omniprésente dans notre société, mais leur utilisa...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
This thesis deals with formal verification of cryptographic protocols. It is about symbolic modellin...
This thesis deals with formal verification of cryptographic protocols. It is about symbolic modellin...
Security protocols are short programs aiming at securing communications over a network. They are wid...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
Cette thèse traite de la vérification des protocoles cryptographiques. Son sujet est la modélisation...
Cette thèse traite de la vérification des protocoles cryptographiques. Son sujet est la modélisation...
Notre société utilise de nombreux systèmes de communications. Parce que ces systèmes sont omniprésen...
Cette thèse est consacrée au problème de la vérification automatique des protocoles cryptographiques...
This thesis is dedicated to the automatic verification of cryptographic protocols in the logical and...
The use of communication protocols has become pervasive at all levels of our society. Yet, their use...
L'utilisation des protocoles de communication est omniprésente dans notre société, mais leur utilisa...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
This thesis deals with formal verification of cryptographic protocols. It is about symbolic modellin...
This thesis deals with formal verification of cryptographic protocols. It is about symbolic modellin...
Security protocols are short programs aiming at securing communications over a network. They are wid...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
Cette thèse traite de la vérification des protocoles cryptographiques. Son sujet est la modélisation...
Cette thèse traite de la vérification des protocoles cryptographiques. Son sujet est la modélisation...
Notre société utilise de nombreux systèmes de communications. Parce que ces systèmes sont omniprésen...
Cette thèse est consacrée au problème de la vérification automatique des protocoles cryptographiques...
This thesis is dedicated to the automatic verification of cryptographic protocols in the logical and...