International audienceKey conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We propose a formalism for detecting computationally feasible key conjuring operations, incorporated into a Dolev-Yao style model of the security API. We show that security in the presence of key conjuring operations is decidable for a particular class of APIs, which includes the key management API of IBM's Common Cryptographic Architecture (CCA)
This paper presents a comprehensive formal security framework for key derivation functions (KDF). Th...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Key management is the Achilles heel of cryptography. In recent years, several attacks have been iden...
International audienceKey conjuring is the process by which an attacker obtains an unknown, encrypte...
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly ca...
We describe a formalism for key conjuring, the process by which an attacker obtains an unknown, encr...
We describe a formalism for key conjuring, the process by which an attacker obtains an unknown, encr...
International audienceWe present an analysis of key wrapping APIs with generic policies. We prove th...
We present an approach to automating computationally sound\ud proofs of key exchange protocols based...
International audienceSecurity APIs are used to define the boundary between trusted and untrusted co...
International audienceSecurity APIs are used to define the boundary between trusted and untrusted co...
International audienceWe describe a new algorithm for analysing security protocols that use XOR, suc...
International audienceWe describe a new algorithm for analysing security protocols that use XOR, suc...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
This paper presents a comprehensive formal security framework for key derivation functions (KDF). Th...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Key management is the Achilles heel of cryptography. In recent years, several attacks have been iden...
International audienceKey conjuring is the process by which an attacker obtains an unknown, encrypte...
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly ca...
We describe a formalism for key conjuring, the process by which an attacker obtains an unknown, encr...
We describe a formalism for key conjuring, the process by which an attacker obtains an unknown, encr...
International audienceWe present an analysis of key wrapping APIs with generic policies. We prove th...
We present an approach to automating computationally sound\ud proofs of key exchange protocols based...
International audienceSecurity APIs are used to define the boundary between trusted and untrusted co...
International audienceSecurity APIs are used to define the boundary between trusted and untrusted co...
International audienceWe describe a new algorithm for analysing security protocols that use XOR, suc...
International audienceWe describe a new algorithm for analysing security protocols that use XOR, suc...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
This paper presents a comprehensive formal security framework for key derivation functions (KDF). Th...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Key management is the Achilles heel of cryptography. In recent years, several attacks have been iden...