PhD ThesisAiming for strong security assurance, researchers in academia and industry focus their interest on formal verification of cryptographic constructions. Automatising formal verification has proved itself to be a very difficult task, where the main challenge is to support generic constructions and theorems, and to carry out the mathematical proofs. This work focuses on machine-checked formalisation and automatic verification of cryptographic protocols. One aspect we covered is the novel support for generic schemes and real-world constructions among old and novel protocols: key exchange schemes (Simple Password Exponential Key Exchange, SPEKE), commitment schemes (with the popular Pedersen scheme), sigma protocols (with the Sch...
International audienceSecurity protocols are distributed programs that aim at securing communication...
Protocol verification is an exciting area of network security that intersects engineering and formal...
International audienceWe present a mechanized proof of the password-based protocol One-Encryption Ke...
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of num...
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of num...
Automated formal verification of security protocols has been mostly focused on analyzing high-level ...
Automated formal verification of security protocols has been mostly focused on analyzing high-level ...
International audienceZero-knowledge proofs have a vast applicability in the domain of cryptography,...
Security protocols are specifications for exchanging messages on a possibly insecure network. They a...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
Security protocols are short programs aiming at securing communications over a network. They are wid...
Security protocols aim to allow secure electronic communication despite the potential presence of ea...
Security protocols are short programs aiming at securing communications over a network. They are wid...
We present a mechanized proof of the password-based protocol One-Encryption Key Exchange (OEKE) usin...
International audienceSecurity protocols are distributed programs that aim at securing communication...
Protocol verification is an exciting area of network security that intersects engineering and formal...
International audienceWe present a mechanized proof of the password-based protocol One-Encryption Ke...
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of num...
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of num...
Automated formal verification of security protocols has been mostly focused on analyzing high-level ...
Automated formal verification of security protocols has been mostly focused on analyzing high-level ...
International audienceZero-knowledge proofs have a vast applicability in the domain of cryptography,...
Security protocols are specifications for exchanging messages on a possibly insecure network. They a...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
Security protocols are short programs aiming at securing communications over a network. They are wid...
Security protocols aim to allow secure electronic communication despite the potential presence of ea...
Security protocols are short programs aiming at securing communications over a network. They are wid...
We present a mechanized proof of the password-based protocol One-Encryption Key Exchange (OEKE) usin...
International audienceSecurity protocols are distributed programs that aim at securing communication...
Protocol verification is an exciting area of network security that intersects engineering and formal...
International audienceWe present a mechanized proof of the password-based protocol One-Encryption Ke...