International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computational complexity of adversaries. The key technical tool is a Hoare logic for reasoning about computational complexity (execution time and oracle calls) of adversarial computations. Our Hoare logic is built on top of the module system used by EasyCrypt for modeling adversaries. We prove that our logic is sound w.r.t. the semantics of EasyCrypt programs-we also provide full semantics for the EasyCrypt module system, which was previously lacking. We showcase (for the first time in EasyCrypt and in other computer-aided cryptographic tools) how our approach can express precise relationships between the probability of adversarial success and their...
The computational treatment of cryptography, and indeed any scientific treatment of a problem, is ma...
We report on our research on proving the security of multi-party cryptographic protocols using the E...
International audienceWe present EasyCrypt, an automated tool for elaborating security proofs of cry...
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
International audienceWe show how implicit computational complexity can be used in order to increase...
Abstract. In the context of Universal Composability, we introduce the concept of universal environme...
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure comp...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
International audienceProvable security [6] is at the heart of modern cryptography. It advocates a m...
We provide a treatment of encryption and zero-knowledge in terms of uniform complexity measures. Thi...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
CertiCrypt is a framework that enables the machine-checked construction and verification of cryptogr...
The computational treatment of cryptography, and indeed any scientific treatment of a problem, is ma...
We report on our research on proving the security of multi-party cryptographic protocols using the E...
International audienceWe present EasyCrypt, an automated tool for elaborating security proofs of cry...
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
International audienceWe show how implicit computational complexity can be used in order to increase...
Abstract. In the context of Universal Composability, we introduce the concept of universal environme...
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure comp...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
International audienceProvable security [6] is at the heart of modern cryptography. It advocates a m...
We provide a treatment of encryption and zero-knowledge in terms of uniform complexity measures. Thi...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
CertiCrypt is a framework that enables the machine-checked construction and verification of cryptogr...
The computational treatment of cryptography, and indeed any scientific treatment of a problem, is ma...
We report on our research on proving the security of multi-party cryptographic protocols using the E...
International audienceWe present EasyCrypt, an automated tool for elaborating security proofs of cry...