The work of Abadi and Fournet introduces the notion of a frame to describe the knowledge of the environment of a cryptographic protocol. Frames are lists of terms; two frames are indistinguishable under the notion of static equivalence if they satisfy the same equations on terms. We present a first-order logic for frames with quantification over environment knowledge which, under certain general conditions, characterizes static equivalence and is amenable to construction of characteristic formulae. The logic can be used to reason about environment knowledge and can be adapted to a particular application by defining a suitable signature and associated equational theory. The logic can furthermore be extended with modalities to yield a modal l...
Abstract. We consider two standard notions in formal security pro-tocol analysis: message deducibili...
Contextual equivalences for cryptographic process calculi can be used to reason about correctness of...
Security protocols are distributed programs designed to ensure secure communi-cation in a network co...
AbstractThe work of Abadi and Fournet introduces the notion of a frame to describe the knowledge of ...
In this master's thesis we present a modal logic for Applied pi which characterises observational ...
Abstract. We define a framework to reason about implementations of equational theories in the presen...
International audienceThere are two main frameworks for analyzing cryptographic systems; the symboli...
International audienceIn this paper we study the link between formal and cryptographic models for se...
AbstractIn this paper we study the link between formal and cryptographic models for security protoco...
AbstractThere are two main ways of defining secrecy of cryptographic protocols. The first version ch...
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if ...
We define a framework to reason about sound implementations of equational theories in the presence o...
Abstract. The indistinguishability of two pieces of data (or two lists of pieces of data) can be rep...
International audienceStatic equivalence is a well established notion of indistinguishability of seq...
1 Introduction In the past few years, significant effort has been made to link formal and compu-tati...
Abstract. We consider two standard notions in formal security pro-tocol analysis: message deducibili...
Contextual equivalences for cryptographic process calculi can be used to reason about correctness of...
Security protocols are distributed programs designed to ensure secure communi-cation in a network co...
AbstractThe work of Abadi and Fournet introduces the notion of a frame to describe the knowledge of ...
In this master's thesis we present a modal logic for Applied pi which characterises observational ...
Abstract. We define a framework to reason about implementations of equational theories in the presen...
International audienceThere are two main frameworks for analyzing cryptographic systems; the symboli...
International audienceIn this paper we study the link between formal and cryptographic models for se...
AbstractIn this paper we study the link between formal and cryptographic models for security protoco...
AbstractThere are two main ways of defining secrecy of cryptographic protocols. The first version ch...
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if ...
We define a framework to reason about sound implementations of equational theories in the presence o...
Abstract. The indistinguishability of two pieces of data (or two lists of pieces of data) can be rep...
International audienceStatic equivalence is a well established notion of indistinguishability of seq...
1 Introduction In the past few years, significant effort has been made to link formal and compu-tati...
Abstract. We consider two standard notions in formal security pro-tocol analysis: message deducibili...
Contextual equivalences for cryptographic process calculi can be used to reason about correctness of...
Security protocols are distributed programs designed to ensure secure communi-cation in a network co...