International audienceMost computational soundness theorems deal with a limited number of primitives, thereby limiting their applicability. The notion of deduction soundness of Cortier and Warinschi (CCS'11) aims to facilitate soundness theorems for richer frameworks via composition results: deduction soundness can be extended, generically, with asymmetric encryption and public data structures. Unfortunately, that paper also hints at rather serious limitations regarding further composition results: composability with digital signatures seems to be precluded. In this paper we provide techniques for bypassing the perceived limitations of deduction soundness and demonstrate that it enjoys vastly improved composition properties. More precisely,...
Formal analysis of security protocols based on symbolic mod-els has been very successful in finding ...
We formalize Abadi and Rogaway's computational soundness result in the Coq interactive theorem prove...
International audienceIn the last decade, formal methods have proved their interest when analyzing s...
International audienceMost computational soundness theorems deal with a limited number of primitives...
International audienceComputational soundness results show that under certain conditions it is possi...
Computational soundness results show that under certain conditions it is possible to conclude comput...
We consider expansions of the Abadi-Rogaway logic of indistinguishability of formal cryptographic ex...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
1 Introduction In the past few years, significant effort has been made to link formal and compu-tati...
In the last two decades, two major directions in cryptography have developed: formal and computation...
In the analysis of security protocols, the knowledge of at-tackers is often described in terms of me...
The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cry...
AbstractWe present two logical systems for reasoning about cryptographic constructions which are sou...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
We develop a compositional method for proving cryptographically sound security properties of key exc...
Formal analysis of security protocols based on symbolic mod-els has been very successful in finding ...
We formalize Abadi and Rogaway's computational soundness result in the Coq interactive theorem prove...
International audienceIn the last decade, formal methods have proved their interest when analyzing s...
International audienceMost computational soundness theorems deal with a limited number of primitives...
International audienceComputational soundness results show that under certain conditions it is possi...
Computational soundness results show that under certain conditions it is possible to conclude comput...
We consider expansions of the Abadi-Rogaway logic of indistinguishability of formal cryptographic ex...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
1 Introduction In the past few years, significant effort has been made to link formal and compu-tati...
In the last two decades, two major directions in cryptography have developed: formal and computation...
In the analysis of security protocols, the knowledge of at-tackers is often described in terms of me...
The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cry...
AbstractWe present two logical systems for reasoning about cryptographic constructions which are sou...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
We develop a compositional method for proving cryptographically sound security properties of key exc...
Formal analysis of security protocols based on symbolic mod-els has been very successful in finding ...
We formalize Abadi and Rogaway's computational soundness result in the Coq interactive theorem prove...
International audienceIn the last decade, formal methods have proved their interest when analyzing s...