A system of session types is introduced as induced by a Curry Howard correspondence applied to Bounded Linear Logic, and then extending the thus obtained type system with probabilistic choices and ground types. The obtained system satisfies the expected properties, like subject reduction and progress, but also unexpected ones, like a polynomial bound on the time needed to reduce processes. This makes the system suitable for modelling experiments and proofs from the so-called computational model of cryptography
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Threshold machines are Turing machines whose acceptance is determined by what portion of the machine...
We describe a cryptographically sound formal logic for proving protocol security properties without ...
A system of session types is introduced as induced by a Curry-Howard correspondence applied to bound...
We show how systems of session types can enforce interactions to take bounded time for all typable p...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
We show how systems of session types can enforce interactions to take bounded time for all typable p...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
Abstract. We describe a probabilistic polynomial-time process calculus for analyzing cryptographic p...
Hunt and Sands (POPL\u2706) studied a flow sensitive type (FST) system for multi-level security, par...
Abstract. We describe a probabilistic polynomial-time process calculus for analyzing cryptographic p...
Type systems for secure information flow aim to prevent a program from leaking information from vari...
AbstractA new probabilistic model of data encryption is introduced. For this model, under suitable c...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Long version of the EXPRESS 2011 paperWe show how systems of sessions types can enforce interaction ...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Threshold machines are Turing machines whose acceptance is determined by what portion of the machine...
We describe a cryptographically sound formal logic for proving protocol security properties without ...
A system of session types is introduced as induced by a Curry-Howard correspondence applied to bound...
We show how systems of session types can enforce interactions to take bounded time for all typable p...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
We show how systems of session types can enforce interactions to take bounded time for all typable p...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
Abstract. We describe a probabilistic polynomial-time process calculus for analyzing cryptographic p...
Hunt and Sands (POPL\u2706) studied a flow sensitive type (FST) system for multi-level security, par...
Abstract. We describe a probabilistic polynomial-time process calculus for analyzing cryptographic p...
Type systems for secure information flow aim to prevent a program from leaking information from vari...
AbstractA new probabilistic model of data encryption is introduced. For this model, under suitable c...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Long version of the EXPRESS 2011 paperWe show how systems of sessions types can enforce interaction ...
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Threshold machines are Turing machines whose acceptance is determined by what portion of the machine...
We describe a cryptographically sound formal logic for proving protocol security properties without ...