The information society we belong to heavily relies on secure information exchanges. To exchange information securely, one should use security protocols that specify how communicating agents should behave notably by using cryptographic primitives (e.g. encryption, signature). Given their ubiquitous and critical nature, we need to reach an extremely high level of confidence that they actually meet their goals. Those goals can be various and depend on the usage context but, more and more often, they include privacy properties (e.g. anonymity, unlinkability). Unfortunately, designed and deployed security protocols are often flawed and critical attacks are regularly disclosed, even on protocols of utmost importance, leading to the never-ending ...
As the number of devices able to communicate grows, so does the need to secure their interactions. T...
National audienceAvec l'avènement des systèmes ubiquitaires, la question du respect de la vie privée...
La mécanique quantique offre un avantage indéniable sur la mécanique classique pour la réalisation d...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
La société de l’information dans laquelle nous vivons repose notamment sur notre capacité à échanger...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
In recent years, the concern for privacy has significantly grown. This is a consequence of the regul...
The demand for internet of Things (IoT) services is increasing exponentially, and a large number of ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Security is a crucial requirement in the applications based on information and communication technol...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Modern security protocols may involve humans in order to compare or copy short strings betweendiffer...
Since the development of computer networks and electronic communications, it becomes important for t...
As the number of devices able to communicate grows, so does the need to secure their interactions. T...
National audienceAvec l'avènement des systèmes ubiquitaires, la question du respect de la vie privée...
La mécanique quantique offre un avantage indéniable sur la mécanique classique pour la réalisation d...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
La société de l’information dans laquelle nous vivons repose notamment sur notre capacité à échanger...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
In recent years, the concern for privacy has significantly grown. This is a consequence of the regul...
The demand for internet of Things (IoT) services is increasing exponentially, and a large number of ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Security is a crucial requirement in the applications based on information and communication technol...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Modern security protocols may involve humans in order to compare or copy short strings betweendiffer...
Since the development of computer networks and electronic communications, it becomes important for t...
As the number of devices able to communicate grows, so does the need to secure their interactions. T...
National audienceAvec l'avènement des systèmes ubiquitaires, la question du respect de la vie privée...
La mécanique quantique offre un avantage indéniable sur la mécanique classique pour la réalisation d...