International audienceWe propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) into a protocol that is secure against a fully active adversary which interacts with an unbounded number of protocol sessions, and has absolute control over the network. The transformation works for arbitrary protocols with any number of participants, written with usual cryptographic primitives. Our transformation provably preserves a large class of security properties that contains secrecy and authenticity. An important byproduct contribution of this paper is a modular protocol development paradigm where designers focus their effort on an extremely simp...
We propose a development method for security protocols based on stepwise re-finement. Our refinement...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
The aim of this research is to present a new methodology for the systematic de sign of compound prot...
International audienceWe propose a general transformation that maps a cryptographic protocol that is...
We introduce and study a general transformation that maps a protocol secure in an extremely weak sen...
We propose a general transformation that maps a protocol secure in an extremely weak sense (essentia...
AbstractThis paper continues the program initiated in [5], towards a derivation system for security ...
International audienceSecurity protocols are small programs that are executed in hostile environment...
International audienceSecurity protocols are small programs that are executed in hostile environment...
International audienceThe design and verification of cryptographic protocols is a notoriously diffic...
We propose a class of protocol transformations, which can be used to (1) develop (families of) secur...
Abstract. Security protocols are small programs that are executed in hostile environments. Many resu...
We propose a development method for security protocols based on stepwise refinement. Our refinement ...
Abstract Formal and symbolic techniques are extremely useful for modelling and analysing security pr...
Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. Th...
We propose a development method for security protocols based on stepwise re-finement. Our refinement...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
The aim of this research is to present a new methodology for the systematic de sign of compound prot...
International audienceWe propose a general transformation that maps a cryptographic protocol that is...
We introduce and study a general transformation that maps a protocol secure in an extremely weak sen...
We propose a general transformation that maps a protocol secure in an extremely weak sense (essentia...
AbstractThis paper continues the program initiated in [5], towards a derivation system for security ...
International audienceSecurity protocols are small programs that are executed in hostile environment...
International audienceSecurity protocols are small programs that are executed in hostile environment...
International audienceThe design and verification of cryptographic protocols is a notoriously diffic...
We propose a class of protocol transformations, which can be used to (1) develop (families of) secur...
Abstract. Security protocols are small programs that are executed in hostile environments. Many resu...
We propose a development method for security protocols based on stepwise refinement. Our refinement ...
Abstract Formal and symbolic techniques are extremely useful for modelling and analysing security pr...
Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. Th...
We propose a development method for security protocols based on stepwise re-finement. Our refinement...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
The aim of this research is to present a new methodology for the systematic de sign of compound prot...