AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed framework allows one to model and reason about attackers that extend the usual Dolev-Yao adversary with explicit probabilistic statements representing properties of cryptographic primitives and the attacker's (partial) information about secret messages. The expressive power of these probabilistic statements is illustrated, namely by representing a standard security notion like indistinguishability under chosen plaintext attacks. We present an entropy-based approach to estimate the probability of a successful attack on a protocol given the prescribed knowledge of the attacker. We prove that, for an attacker whose knowledge increases with the sec...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
Abstract. Logics for security protocol analysis require the formalization of an adversary model that...
We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the P...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
Abstract. We introduce a probabilistic framework for the automated analysis of security protocols. O...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
International audienceWe consider the problem of formal automatic verification of cryptographic prot...
Abstract. We present a novel equivalence for cryptographic expressions that overcomes two limitation...
peer-reviewedThe Dolev-Yao model has been widely used in protocol verificaion and has been impleme...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
International audienceWe propose a probabilistic variant of the pi-calculus as a framework to specif...
International audienceWe consider the problem of automating proofs of cryptographic protocols when s...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
AbstractWe consider secrecy and authentication in a simple process calculus with cryptographic primi...
AbstractWe prove properties of a process calculus that is designed for analysing security protocols....
International audienceThe quantification of information leakage provides a quantitative evaluation o...
Abstract. Logics for security protocol analysis require the formalization of an adversary model that...
We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the P...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
Abstract. We introduce a probabilistic framework for the automated analysis of security protocols. O...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
International audienceWe consider the problem of formal automatic verification of cryptographic prot...
Abstract. We present a novel equivalence for cryptographic expressions that overcomes two limitation...
peer-reviewedThe Dolev-Yao model has been widely used in protocol verificaion and has been impleme...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
International audienceWe propose a probabilistic variant of the pi-calculus as a framework to specif...
International audienceWe consider the problem of automating proofs of cryptographic protocols when s...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
AbstractWe consider secrecy and authentication in a simple process calculus with cryptographic primi...
AbstractWe prove properties of a process calculus that is designed for analysing security protocols....
International audienceThe quantification of information leakage provides a quantitative evaluation o...
Abstract. Logics for security protocol analysis require the formalization of an adversary model that...
We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the P...