International audienceIt is a common practice to design a protocol (say Q) assuming some secure channels. Then the secure channels are implemented using any standard protocol, e.g. TLS. In this paper, we study when such a practice is indeed secure. We provide a characterization of both confidential and authenticated channels. As an application, we study several protocols of the literature including TLS and BAC protocols. Thanks to our result, we can consider a larger number of sessions when analyzing complex protocols resulting from explicit implementation of the secure channels of some more abstract protocol Q
Secure channel protocols protect data transmission over a network from being overheard or tampered w...
Secure communication has become an essential ingredient of our daily life. Mostly unnoticed, cryptog...
International audienceSecurity protocols are short programs aiming at securing communications over a...
International audienceIt is a common practice to design a protocol (say Q) assuming some secure chan...
It is a common practice to design a protocol (say Q) assuming some secure channels. Then the secure ...
The world is becoming strongly dependent on computers, and on distributed communication between comp...
Abstract. Security architectures often make use of secure transport protocols to protect network mes...
A secure channel is a cryptographic protocol that adds security to unprotected network connections. ...
International audienceSecurity protocols are small programs that are executed in hostile environment...
Security architectures often make use of secure transport protocols to protect network messages: the...
Secure channels are one of the most pivotal building blocks of cryptography today. Internet connecti...
International audienceSecurity protocols are small programs that are executed in hostile environment...
We propose a development method for security protocols based on stepwise refinement. Our refinement ...
Secure channel protocols protect data transmission over a network from being overheard or tampered w...
Secure communication has become an essential ingredient of our daily life. Mostly unnoticed, cryptog...
International audienceSecurity protocols are short programs aiming at securing communications over a...
International audienceIt is a common practice to design a protocol (say Q) assuming some secure chan...
It is a common practice to design a protocol (say Q) assuming some secure channels. Then the secure ...
The world is becoming strongly dependent on computers, and on distributed communication between comp...
Abstract. Security architectures often make use of secure transport protocols to protect network mes...
A secure channel is a cryptographic protocol that adds security to unprotected network connections. ...
International audienceSecurity protocols are small programs that are executed in hostile environment...
Security architectures often make use of secure transport protocols to protect network messages: the...
Secure channels are one of the most pivotal building blocks of cryptography today. Internet connecti...
International audienceSecurity protocols are small programs that are executed in hostile environment...
We propose a development method for security protocols based on stepwise refinement. Our refinement ...
Secure channel protocols protect data transmission over a network from being overheard or tampered w...
Secure communication has become an essential ingredient of our daily life. Mostly unnoticed, cryptog...
International audienceSecurity protocols are short programs aiming at securing communications over a...