Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of numerous critical components has been neglected. As a consequence, attacks have resulted in financial loss, violations of personal privacy, and threats to democracy. This thesis aids the secure design of cryptographic protocols and facilitates the evaluation of existing schemes. Developing a secure cryptographic protocol is game-like in nature, and a good designer will consider attacks against key components. Unlike games, however, an adversary is not governed by the rules and may deviate from expected behaviours. Secure cryptographic protocols are therefore notoriously difficult to define. Accordingly, cryptographic protocols must be scrutinise...
Colloque sur invitation. Internationale.International audienceInternet is becoming everyday a more w...
Election verifiability is one of the main security properties of e-voting protocols, referring to th...
International audienceSecurity protocols are distributed programs that aim at securing communication...
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of num...
Security is a crucial requirement in the applications based on information and communication technol...
PhD ThesisAiming for strong security assurance, researchers in academia and industry focus their in...
Security protocols are short programs aiming at securing communications over a network. They are wid...
A cryptographic protocol (CP) is a distributed algorithm designed to provide a secure communication ...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
Cryptography is used to protect data and communications. The basic tools are cryptographic primitiv...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
Security protocols aim to allow secure electronic communication despite the potential presence of ea...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
Security protocols are specifications for exchanging messages on a possibly insecure network. They a...
Automated formal verification of security protocols has been mostly focused on analyzing high-level ...
Colloque sur invitation. Internationale.International audienceInternet is becoming everyday a more w...
Election verifiability is one of the main security properties of e-voting protocols, referring to th...
International audienceSecurity protocols are distributed programs that aim at securing communication...
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of num...
Security is a crucial requirement in the applications based on information and communication technol...
PhD ThesisAiming for strong security assurance, researchers in academia and industry focus their in...
Security protocols are short programs aiming at securing communications over a network. They are wid...
A cryptographic protocol (CP) is a distributed algorithm designed to provide a secure communication ...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
Cryptography is used to protect data and communications. The basic tools are cryptographic primitiv...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
Security protocols aim to allow secure electronic communication despite the potential presence of ea...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
Security protocols are specifications for exchanging messages on a possibly insecure network. They a...
Automated formal verification of security protocols has been mostly focused on analyzing high-level ...
Colloque sur invitation. Internationale.International audienceInternet is becoming everyday a more w...
Election verifiability is one of the main security properties of e-voting protocols, referring to th...
International audienceSecurity protocols are distributed programs that aim at securing communication...