Cryptographers rely on visualization to effectively communicate cryptographic constructions with one another. Visual frameworks such as constructive cryptography (TOSCA 2011), the joy of cryptography (online book) and state-separating proofs (SSPs, Asiacrypt 2018) are useful to communicate not only the construction, but also their proof visually by representing a cryptographic system as graphs. One SSP core feature is the re-use of code, e.g., a package of code might be used in a game and be part of the description of a reduction as well. Thus, in a proof, the linear structure of a paper either requires the reader to turn pages to find definitions or writers to re-state them, thereby interrupting the visual flow of the game hops that are...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
International audienceEasyCrypt is an automated tool that supports the machine-checked construction ...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...
Cryptographic proofs are the most important aspect of reasoning about a protocol/construction's secu...
The security analysis of real-world protocols involves reduction steps that are conceptually simple ...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
International audienceState-separating proofs (SSP) is a recent methodology for structuring game-bas...
Provable security refers to the ability to give rigorous mathematical proofs towards the security of...
Game-based proofs are a well-established paradigm for structuring security arguments and simplifying...
Verifying cryptographic security proofs manually is inherently tedious and error-prone. The game-pla...
The goal of modern cryptography is to design efficient constructions that simultaneously achieve som...
International audienceWe present EasyCrypt, an automated tool for elaborating security proofs of cry...
We analyse transformations between cryptographic primitives and, for each transformation, we do two ...
The game-based approach is a popular methodology for structuring cryptographic proofs as sequences o...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
International audienceEasyCrypt is an automated tool that supports the machine-checked construction ...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...
Cryptographic proofs are the most important aspect of reasoning about a protocol/construction's secu...
The security analysis of real-world protocols involves reduction steps that are conceptually simple ...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
International audienceState-separating proofs (SSP) is a recent methodology for structuring game-bas...
Provable security refers to the ability to give rigorous mathematical proofs towards the security of...
Game-based proofs are a well-established paradigm for structuring security arguments and simplifying...
Verifying cryptographic security proofs manually is inherently tedious and error-prone. The game-pla...
The goal of modern cryptography is to design efficient constructions that simultaneously achieve som...
International audienceWe present EasyCrypt, an automated tool for elaborating security proofs of cry...
We analyse transformations between cryptographic primitives and, for each transformation, we do two ...
The game-based approach is a popular methodology for structuring cryptographic proofs as sequences o...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
International audienceEasyCrypt is an automated tool that supports the machine-checked construction ...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...