International audienceSecurity protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol in the presence of an active attacker that may block, intercept and send new messages. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols are executed, possibly sharing some common keys like public keys or long-term symmetric keys. In this paper, we show that security of protocols can be easily composed. More precisely, we show that whenever a protocol is secure, it remains secure even in an environment where arbitrary protocols satisfying a reasonab...
International audienceFormal and symbolic techniques are extremely useful for modelling and analysin...
International audienceSecurity properties of cryptographic protocols are typically expressed as reac...
Abstract Formal and symbolic techniques are extremely useful for modelling and analysing security pr...
International audienceSecurity protocols are small programs that are executed in hostile environment...
International audienceSecurity protocols are small programs that are executed in hostile environment...
Abstract. Security protocols are small programs that are executed in hostile environments. Many resu...
Abstract. Security protocols are small programs that are executed in hostile environments. Many resu...
International audienceWe propose a general transformation that maps a cryptographic protocol that is...
AbstractThis paper continues the program initiated in [5], towards a derivation system for security ...
International audienceSecurity protocols are short programs aiming at securing communications over a...
Formal analysis of security protocols has been researched the last decades, recent de-velopments int...
International audienceIt is a common practice to design a protocol (say Q) assuming some secure chan...
International audienceSecurity protocols are short programs that aim at securing communication over ...
Abstract. Security protocols are used in many of our daily-life applica-tions, and our privacy large...
. We develop principles and rules for achieving secrecy properties in security protocols. Our approa...
International audienceFormal and symbolic techniques are extremely useful for modelling and analysin...
International audienceSecurity properties of cryptographic protocols are typically expressed as reac...
Abstract Formal and symbolic techniques are extremely useful for modelling and analysing security pr...
International audienceSecurity protocols are small programs that are executed in hostile environment...
International audienceSecurity protocols are small programs that are executed in hostile environment...
Abstract. Security protocols are small programs that are executed in hostile environments. Many resu...
Abstract. Security protocols are small programs that are executed in hostile environments. Many resu...
International audienceWe propose a general transformation that maps a cryptographic protocol that is...
AbstractThis paper continues the program initiated in [5], towards a derivation system for security ...
International audienceSecurity protocols are short programs aiming at securing communications over a...
Formal analysis of security protocols has been researched the last decades, recent de-velopments int...
International audienceIt is a common practice to design a protocol (say Q) assuming some secure chan...
International audienceSecurity protocols are short programs that aim at securing communication over ...
Abstract. Security protocols are used in many of our daily-life applica-tions, and our privacy large...
. We develop principles and rules for achieving secrecy properties in security protocols. Our approa...
International audienceFormal and symbolic techniques are extremely useful for modelling and analysin...
International audienceSecurity properties of cryptographic protocols are typically expressed as reac...
Abstract Formal and symbolic techniques are extremely useful for modelling and analysing security pr...