In this thesis, we address the lack of formalisms to carry out concrete security proofs. Our contributions are threefold. First, we present a logic, named Computational Indistinguishability Logic (CIL), for reasoning about cryptographic systems. It consists in a small set of rules capturing reasoning principles common to many proofs. Their formalization relies on classic tools such as bisimulation relations and contexts. Second, and in order to increase proof automation, it presents a Hoare logic dedicated to asymmetric encryption schemes in the Random Oracle Model that yields an automated and sound verification method. It has been successfully applied to existing encryption schemes. Third, it presents a general reduction theorem for provin...
International audienceChosen-ciphertext security is by now a standard security property for asymmetr...
In the last two decades, two major directions in cryptography have developed: formal and computation...
Cette thèse s'inscrit dans le domaine de la vérification de protocoles cryptographiques dans le modè...
In this thesis, we address the lack of formalisms to carry out concrete security proofs. Our contrib...
Cette thèse se propose de remédier à l'absence de formalisme dédié aux preuves de sécurité concrète ...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
International audienceMany generic constructions for building secure cryptosystems from primi-tives ...
Notre société utilise de nombreux systèmes de communications. Parce que ces systèmes sont omniprésen...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
CertiCrypt is a framework that enables the machine-checked construction and verification of cryptogr...
The notion of indifferentiability, which is a stronger version of the classic notion of indistinguis...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
The field of cryptographic protocol verification in the computational model aims at obtaining formal...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
International audienceChosen-ciphertext security is by now a standard security property for asymmetr...
In the last two decades, two major directions in cryptography have developed: formal and computation...
Cette thèse s'inscrit dans le domaine de la vérification de protocoles cryptographiques dans le modè...
In this thesis, we address the lack of formalisms to carry out concrete security proofs. Our contrib...
Cette thèse se propose de remédier à l'absence de formalisme dédié aux preuves de sécurité concrète ...
International audienceSeveral generic constructions for transforming one-way func-tions to asymmetri...
International audienceMany generic constructions for building secure cryptosystems from primi-tives ...
Notre société utilise de nombreux systèmes de communications. Parce que ces systèmes sont omniprésen...
Provable security is nowadays one of the major lines of research in Cryptography. It aims at providi...
CertiCrypt is a framework that enables the machine-checked construction and verification of cryptogr...
The notion of indifferentiability, which is a stronger version of the classic notion of indistinguis...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
The field of cryptographic protocol verification in the computational model aims at obtaining formal...
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have b...
International audienceChosen-ciphertext security is by now a standard security property for asymmetr...
In the last two decades, two major directions in cryptography have developed: formal and computation...
Cette thèse s'inscrit dans le domaine de la vérification de protocoles cryptographiques dans le modè...