Udgivelsesdato: JANWe use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spectrum, become undecidable for a very simple recursive extension of the protocol. The result holds even if no nondeterministic choice operator is allowed but reachability is shown to be decidable in polynomial time if only two parties are participating in the protocol. We also show that the calculus is capable of an implicit description of the active intruder, including full analysis and synthesis of messages in the sense of Amad...
All in-text references underlined in blue are linked to publications on ResearchGate, letting you ac...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
Analysis of cryptographic protocols in a symbolic model is relative to a deduction system that model...
We use some very recent techniques from process algebra to draw interesting conclusions about the we...
This paper introduces a process calculus with recursion which allows us to express an unbounded numb...
We use some recent techniques from process algebra to draw several conclusions about the well studie...
Abstract. Ping-pong protocols with recursive definitions of agents, but without any active intruder,...
We identify a new decidable class of security protocols, both for reachability and equivalence prope...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
Abstract. Only very little is known about the automatic analysis of cryptographic protocols for game...
Abstract. Many decidability results are known for non-recursive cryptographic protocols, where the p...
Formal analysis of cryptographic protocols has mainly concentrated on protocols with closed-ended d...
All in-text references underlined in blue are linked to publications on ResearchGate, letting you ac...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
Analysis of cryptographic protocols in a symbolic model is relative to a deduction system that model...
We use some very recent techniques from process algebra to draw interesting conclusions about the we...
This paper introduces a process calculus with recursion which allows us to express an unbounded numb...
We use some recent techniques from process algebra to draw several conclusions about the well studie...
Abstract. Ping-pong protocols with recursive definitions of agents, but without any active intruder,...
We identify a new decidable class of security protocols, both for reachability and equivalence prope...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a...
AbstractCryptographic protocols can be divided into (1) protocols where the protocol steps are simpl...
Abstract. Only very little is known about the automatic analysis of cryptographic protocols for game...
Abstract. Many decidability results are known for non-recursive cryptographic protocols, where the p...
Formal analysis of cryptographic protocols has mainly concentrated on protocols with closed-ended d...
All in-text references underlined in blue are linked to publications on ResearchGate, letting you ac...
International audienceSecurity of a cryptographic protocol for a bounded number of sessions is usual...
Analysis of cryptographic protocols in a symbolic model is relative to a deduction system that model...