Many tools have been developed to automatically verify security properties on cryptographic protocols. But until recently, most tools focused on trace properties (or reachability properties) such as authentication and secrecy. However, many security properties cannot be expressed as trace properties, but can be written as equivalence properties. Privacy, unlinkability, and strong secrecy are typical examples of equivalence properties. Intuitively, two protocols P, Q are equivalent if an adversary can not distinguish P from Q by interacting with these processes. In the literature, several notions of equivalence were studied, e.g. trace equivalence or a stronger one, observational equivalence. However, it is often very difficult to prove by ...
International audienceIn this paper, we consider the problem of verifying anonymity and unlinkabilit...
Verification of privacy-type properties for cryptographic protocols in an active adversarial environ...
Formal methods have proved their usefulness for analyzing the security of protocols. Most existing r...
Many tools have been developed to automatically verify security properties on cryptographic protocol...
Plusieurs outils ont été développé pour vérifier automatiquement les propriétés de sécurité sur des ...
Plusieurs outils ont été développé pour vérifier automatiquement les propriétés de sécurité sur des ...
Formal methods have proved their usefulness for analysing the security of protocols. In this setting...
The original publication is available at www.springerlink.comInternational audienceIndistinguishabil...
This paper presents APTE, a new tool for automatically proving the security of cryptographic protoco...
Security protocols are used in many of our daily-life applications, and our privacy largely depends ...
Indistinguishability properties are essential in formal verification of cryptographic protocols. The...
We consider security properties of cryptographic protocols, that are either trace properties (such a...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
We consider security properties of cryptographic protocols that can be modeled using the notion of t...
Abstract. This paper presents APTE, a new tool for automatically proving the security of cryptograph...
International audienceIn this paper, we consider the problem of verifying anonymity and unlinkabilit...
Verification of privacy-type properties for cryptographic protocols in an active adversarial environ...
Formal methods have proved their usefulness for analyzing the security of protocols. Most existing r...
Many tools have been developed to automatically verify security properties on cryptographic protocol...
Plusieurs outils ont été développé pour vérifier automatiquement les propriétés de sécurité sur des ...
Plusieurs outils ont été développé pour vérifier automatiquement les propriétés de sécurité sur des ...
Formal methods have proved their usefulness for analysing the security of protocols. In this setting...
The original publication is available at www.springerlink.comInternational audienceIndistinguishabil...
This paper presents APTE, a new tool for automatically proving the security of cryptographic protoco...
Security protocols are used in many of our daily-life applications, and our privacy largely depends ...
Indistinguishability properties are essential in formal verification of cryptographic protocols. The...
We consider security properties of cryptographic protocols, that are either trace properties (such a...
Security properties of cryptographic protocols are typically expressed as reachability or equivalenc...
We consider security properties of cryptographic protocols that can be modeled using the notion of t...
Abstract. This paper presents APTE, a new tool for automatically proving the security of cryptograph...
International audienceIn this paper, we consider the problem of verifying anonymity and unlinkabilit...
Verification of privacy-type properties for cryptographic protocols in an active adversarial environ...
Formal methods have proved their usefulness for analyzing the security of protocols. Most existing r...