In recent years, formal methods have been developed to analyze and verify cryptographic protocols. We will focus on protocols that rely on iteration or recursion. These protocols typically use special security tokens - such as numbers used only once, called nonces, or keys generated by a principal - to achieve their security assertions. The recursion depth of the computations in such protocols and thus the number of fresh tokens occurring in a run of a protocol is not explicitly bounded by the protocol's description. Therefore, we need a mechanism to provide the protocol's principals with the ability to generate an unbounded number of fresh tokens. In this report we will extend the model of selecting theories introduced by Truderung - in th...
AbstractWe investigate the complexity of the protocol insecurity problem for a finite number of sess...
We use some very recent techniques from process algebra to draw interesting conclusions about the we...
International audienceWe consider the problem of automating proofs of cryptographic protocols when s...
In recent years, formal methods have been developed to analyze and verify cryptographic protocols. W...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
Abstract. Many decidability results are known for non-recursive cryptographic protocols, where the p...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
We use some recent techniques from process algebra to draw several conclusions about the well studie...
We propose a protocol model which integrates two different ways of analyzing cryptographic protocols...
In this thesis we introduce the alternating mu-calculus (AMC) for cryptographic protocols and show i...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
We propose a protocol model in which principals are described by transducers (Mealy machines), i.e.,...
Formal models for security protocols often rely on assumptions not to be found in computational mode...
AbstractWe investigate the complexity of the protocol insecurity problem for a finite number of sess...
We use some very recent techniques from process algebra to draw interesting conclusions about the we...
International audienceWe consider the problem of automating proofs of cryptographic protocols when s...
In recent years, formal methods have been developed to analyze and verify cryptographic protocols. W...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
Abstract. Many decidability results are known for non-recursive cryptographic protocols, where the p...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
We use some recent techniques from process algebra to draw several conclusions about the well studie...
We propose a protocol model which integrates two different ways of analyzing cryptographic protocols...
In this thesis we introduce the alternating mu-calculus (AMC) for cryptographic protocols and show i...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
We propose a protocol model in which principals are described by transducers (Mealy machines), i.e.,...
Formal models for security protocols often rely on assumptions not to be found in computational mode...
AbstractWe investigate the complexity of the protocol insecurity problem for a finite number of sess...
We use some very recent techniques from process algebra to draw interesting conclusions about the we...
International audienceWe consider the problem of automating proofs of cryptographic protocols when s...