It has long been a challenge to determine conclusively whether a given protocol is secure or not. The development of formal techniques that can check various security properties is an important tool to meet this challenge. This document contributes to the development of such techniques by model security protocols using an algebra of coloured Petri net call ABCD and reduce time to checked the protocols using parallel computations. We exploit the wellstructured nature of security protocols and match it to a model of parallel computation called BSP. The structure of the protocols is exploited to partition the state space and reduce cross transitions while increasing computation locality. At the same time, the BSP model allows to simplify the d...
CryptoVerif [Bla08] is a protocol verifier in the computational model that can automatically prove p...
We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC...
The formal analysis of security protocols is a prime example of a domain where model checking has be...
Abstract—This paper presents a Bulk-Synchronous Parallel (BSP) algorithm to compute on-the-fly wheth...
International audienceThis paper presents a distributed (Bulk-Synchronous Parallel or bsp) algorithm...
International audienceThis paper presents a distributed algorithm to compute on-the-fly whether a str...
This paper presents a Bulk-Synchronous Parallel (BSP) algorithm to compute the discrete state space ...
International audienceThis paper presents a Bulk-Synchronous Parallel (BSP) algorithm to compute the...
International audienceGiven the central importance of designing secure protocols, providing solid ma...
This thesis takes part in the formal verification of parallel programs. The aim of formal verificati...
Article dans revue scientifique avec comité de lecture. internationale.International audienceWe pres...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
The goal of this work is to obtain implementations of security protocols proved in the computational...
TLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus o...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
CryptoVerif [Bla08] is a protocol verifier in the computational model that can automatically prove p...
We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC...
The formal analysis of security protocols is a prime example of a domain where model checking has be...
Abstract—This paper presents a Bulk-Synchronous Parallel (BSP) algorithm to compute on-the-fly wheth...
International audienceThis paper presents a distributed (Bulk-Synchronous Parallel or bsp) algorithm...
International audienceThis paper presents a distributed algorithm to compute on-the-fly whether a str...
This paper presents a Bulk-Synchronous Parallel (BSP) algorithm to compute the discrete state space ...
International audienceThis paper presents a Bulk-Synchronous Parallel (BSP) algorithm to compute the...
International audienceGiven the central importance of designing secure protocols, providing solid ma...
This thesis takes part in the formal verification of parallel programs. The aim of formal verificati...
Article dans revue scientifique avec comité de lecture. internationale.International audienceWe pres...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
The goal of this work is to obtain implementations of security protocols proved in the computational...
TLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus o...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
CryptoVerif [Bla08] is a protocol verifier in the computational model that can automatically prove p...
We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC...
The formal analysis of security protocols is a prime example of a domain where model checking has be...