International audienceWe show that the insecurity problem for protocols with modular exponentiation and arbitrary products allowed in exponents is NP-complete. This result is based on a protocol and intruder model which is powerful enough to uncover known attacks on the Authenticated Group Diffie-Hellman (A-GDH.2) protocol suite. To prove our results, we develop a general framework in which the Dolev-Yao intruder is extended by generic intruder rules. This framework is also applied to obtain complexity results for protocols with commuting public key encryption
AbstractMany cryptographic protocols and attacks on these protocols make use of the fact that the or...
AbstractWe investigate the complexity of the protocol insecurity problem for a finite number of sess...
We present complexity results for the verification of security protocols. Since the perfect cryptogr...
International audienceWe show that the insecurity problem for protocols with modular exponentiation ...
International audienceWe show that the insecurity problem for protocols with modular exponentiation ...
International audienceWe show that the insecurity problem for protocols with modular exponentiation ...
International audienceWe show that the insecurity problem for protocols with modular exponentiation ...
Abstract. We present an NP decision procedure for the formal analysis of protocols in presence of mo...
Long version available as Christian-Albrecht Universität IFI-Report 0305, Kiel (Germany)We present a...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
AbstractMany cryptographic protocols and attacks on these protocols make use of the fact that the or...
AbstractWe investigate the complexity of the protocol insecurity problem for a finite number of sess...
We present complexity results for the verification of security protocols. Since the perfect cryptogr...
International audienceWe show that the insecurity problem for protocols with modular exponentiation ...
International audienceWe show that the insecurity problem for protocols with modular exponentiation ...
International audienceWe show that the insecurity problem for protocols with modular exponentiation ...
International audienceWe show that the insecurity problem for protocols with modular exponentiation ...
Abstract. We present an NP decision procedure for the formal analysis of protocols in presence of mo...
Long version available as Christian-Albrecht Universität IFI-Report 0305, Kiel (Germany)We present a...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
We investigate the complexity of the protocol insecurity problem for a finite number of sessions (fi...
AbstractMany cryptographic protocols and attacks on these protocols make use of the fact that the or...
AbstractWe investigate the complexity of the protocol insecurity problem for a finite number of sess...
We present complexity results for the verification of security protocols. Since the perfect cryptogr...