International audienceWe present a mechanized proof of the password-based protocol One-Encryption Key Exchange (OEKE) using the computationally-sound protocol prover CryptoVerif. OEKE is a non-trivial protocol, and thus mechanizing its proof provides additional confidence that it is correct. This case study was also an opportunity to implement several important extensions of CryptoVerif, useful for proving many other protocols. We have indeed extended CryptoVerif to support the computational Diffie-Hellman assumption. We have also added support for proofs that rely on Shoup's lemma and additional game transformations. In particular, it is now possible to insert case distinctions manually and to merge cases that no longer need to be distingu...
This paper presents the first automatic technique for proving not only protocols but also primitives...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
We present a mechanized proof of the password-based protocol One-Encryption Key Exchange (OEKE) usin...
Given the central importance of designing secure protocols, providing solid mathematical foundations...
We present an approach to automating computationally sound proofs of key exchange protocols based on...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
International audienceProvable security [6] is at the heart of modern cryptography. It advocates a m...
International audienceAfter a short introduction to the field of security protocol verification, we ...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the app...
International audienceEasyCrypt is an automated tool that supports the machine-checked construction ...
PhD ThesisAiming for strong security assurance, researchers in academia and industry focus their in...
Abstract. After a short introduction to the field of security protocol verification, we present the ...
Our society extensively relies on communications systems. Because such systems are used to exchange ...
CryptoVerif [Bla08] is a protocol verifier in the computational model that can automatically prove p...
This paper presents the first automatic technique for proving not only protocols but also primitives...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
We present a mechanized proof of the password-based protocol One-Encryption Key Exchange (OEKE) usin...
Given the central importance of designing secure protocols, providing solid mathematical foundations...
We present an approach to automating computationally sound proofs of key exchange protocols based on...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
International audienceProvable security [6] is at the heart of modern cryptography. It advocates a m...
International audienceAfter a short introduction to the field of security protocol verification, we ...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the app...
International audienceEasyCrypt is an automated tool that supports the machine-checked construction ...
PhD ThesisAiming for strong security assurance, researchers in academia and industry focus their in...
Abstract. After a short introduction to the field of security protocol verification, we present the ...
Our society extensively relies on communications systems. Because such systems are used to exchange ...
CryptoVerif [Bla08] is a protocol verifier in the computational model that can automatically prove p...
This paper presents the first automatic technique for proving not only protocols but also primitives...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Cryptography is a small but crucial part of information security. The design of secure cryptographic...