International audienceIn the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the secret. Several decision procedures have been developed so far for both notions but none of them can be applied in the context of e-voting protocols, which require dedicated cryptographic primitives. In this work, we show that both deduct...
International audienceElectronic voting should offer at least the same guarantees than traditional p...
This thesis is about the formal verification and composition of security protocols, motivated by app...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...
International audienceIn the last decade, formal methods have proved their interest when analyzing s...
Abstract. The analysis of security protocols requires precise formulations of the knowledge of proto...
In the analysis of security protocols, the knowledge of at-tackers is often described in terms of me...
International audienceIn formal approaches, messages sent over a network are usu- ally modeled by te...
International audienceThe analysis of security protocols requires reasoning about the knowledge an a...
AbstractThe analysis of security protocols requires precise formulations of the knowledge of protoco...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
International audienceComputational indistinguishability is a key property in cryptography and verif...
Since 1981, a large variety of formal methods for the analysis of cryptographic protocols has evolve...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
Abstract. E-voting protocols aim at achieving a wide range of sophisticated se-curity properties and...
International audienceElectronic voting should offer at least the same guarantees than traditional p...
This thesis is about the formal verification and composition of security protocols, motivated by app...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...
International audienceIn the last decade, formal methods have proved their interest when analyzing s...
Abstract. The analysis of security protocols requires precise formulations of the knowledge of proto...
In the analysis of security protocols, the knowledge of at-tackers is often described in terms of me...
International audienceIn formal approaches, messages sent over a network are usu- ally modeled by te...
International audienceThe analysis of security protocols requires reasoning about the knowledge an a...
AbstractThe analysis of security protocols requires precise formulations of the knowledge of protoco...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
International audienceIn formal approaches, messages sent over a network are usually modeled by term...
International audienceComputational indistinguishability is a key property in cryptography and verif...
Since 1981, a large variety of formal methods for the analysis of cryptographic protocols has evolve...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
Abstract. E-voting protocols aim at achieving a wide range of sophisticated se-curity properties and...
International audienceElectronic voting should offer at least the same guarantees than traditional p...
This thesis is about the formal verification and composition of security protocols, motivated by app...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...