International audienceThere is a large amount of work dedicated to the formal verification of security protocols. In this paper, we revisit and extend the NP-complete decision procedure for a bounded number of sessions. We use a, now standard, deducibility constraint formalism for modeling security protocols. Our first contribution is to give a simple set of constraint simplification rules, that allows to reduce any deducibility constraint to a set of solved forms, representing all solutions (within the bound on sessions). As a consequence, we prove that deciding the existence of key cycles is NP-complete for a bounded number of sessions. The problem of key-cycles has been put forward by recent works relating computational and symbolic mode...
Cette thèse se situe dans le cadre de l'analyse symbolique des protocoles Les contributions sont rep...
Colloque avec actes et comité de lecture. internationale.International audienceWe show that deciding...
International audienceWe consider the problem of formal automatic verification of cryptographic prot...
International audienceThere is a large amount of work dedicated to the formal verification of securi...
Abstract. Many recent results are concerned with interpreting proofs of security done in symbolic mo...
International audienceThe design and verification of cryptographic protocols is a notoriously diffic...
The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cry...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We present decidability results for the verification of cryptographic protocols in the presence of e...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
We study the problem of analysing the security for an unbounded number of concurrent sessions of a c...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
Abstract. Only very little is known about the automatic analysis of cryptographic protocols for game...
International audienceGiven the central importance of designing secure protocols, providing solid ma...
Cette thèse se situe dans le cadre de l'analyse symbolique des protocoles Les contributions sont rep...
Colloque avec actes et comité de lecture. internationale.International audienceWe show that deciding...
International audienceWe consider the problem of formal automatic verification of cryptographic prot...
International audienceThere is a large amount of work dedicated to the formal verification of securi...
Abstract. Many recent results are concerned with interpreting proofs of security done in symbolic mo...
International audienceThe design and verification of cryptographic protocols is a notoriously diffic...
The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cry...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We present decidability results for the verification of cryptographic protocols in the presence of e...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
We study the problem of analysing the security for an unbounded number of concurrent sessions of a c...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
Abstract. Only very little is known about the automatic analysis of cryptographic protocols for game...
International audienceGiven the central importance of designing secure protocols, providing solid ma...
Cette thèse se situe dans le cadre de l'analyse symbolique des protocoles Les contributions sont rep...
Colloque avec actes et comité de lecture. internationale.International audienceWe show that deciding...
International audienceWe consider the problem of formal automatic verification of cryptographic prot...