International audienceWe are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic properties satisfied by the operators involved in the protocol. This leads to a more realistic model than what we get under the perfect cryptography assumption, but it implies that protocol analysis deals with terms modulo some equational theory instead of terms in a free algebra. The main goal of this paper is to set up a general approach that works for a whole class of monoidal theories which contains many of the specific cases that have been considered so far in an ad-hoc way (e.g. exclusive or, Abelian group...
We present decidability results for the verification of cryptographic protocols in the presence of e...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
International audienceWhen formally analyzing security protocols it is often im- portant to express ...
International audienceWe are interested in the design of automated procedures for analyzing the (in)...
We are interested in the design of automated procedures for analyzing the (in)security of cryptograp...
International audienceWe are interested in the design of automated procedures for analyzing the (in)...
AbstractWe are interested in the design of automated procedures for analyzing the (in)security of cr...
International audienceWe are interested in the design of automated procedures for analyzing the (in)...
AbstractWe are interested in the design of automated procedures for analyzing the (in)security of cr...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
We demonstrate that for any well-defined cryptographic protocol, the symbolic trace reachability pro...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
We present decidability results for the verification of cryptographic protocols in the presence of e...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
International audienceWhen formally analyzing security protocols it is often im- portant to express ...
International audienceWe are interested in the design of automated procedures for analyzing the (in)...
We are interested in the design of automated procedures for analyzing the (in)security of cryptograp...
International audienceWe are interested in the design of automated procedures for analyzing the (in)...
AbstractWe are interested in the design of automated procedures for analyzing the (in)security of cr...
International audienceWe are interested in the design of automated procedures for analyzing the (in)...
AbstractWe are interested in the design of automated procedures for analyzing the (in)security of cr...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
We demonstrate that for any well-defined cryptographic protocol, the symbolic trace reachability pro...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
We present decidability results for the verification of cryptographic protocols in the presence of e...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
International audienceWhen formally analyzing security protocols it is often im- portant to express ...