Decidability of trace equivalence for protocols with nonces

R Chrétien, V Cortier, S Delaune - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
Privacy properties such as anonymity, unlink ability, or vote secrecy are typically expressed
as equivalence properties. In this paper, we provide the first decidability result for trace …

Symbolic proofs for lattice-based cryptography

G Barthe, X Fan, J Gancher, B Grégoire… - Proceedings of the …, 2018 - dl.acm.org
Symbolic methods have been used extensively for proving security of cryptographic
protocols in the Dolev-Yao model, and more recently for proving security of cryptographic …

Experimental study of Diffie-Hellman key exchange algorithm on embedded devices

P Deshpande, S Santhanalakshmi… - … , Data Analytics and …, 2017 - ieeexplore.ieee.org
Security in Embedded systems has become an important constraint in modern days. There
are different cryptographic algorithms developed for providing data security. Among these …

Exploring theories with a model-finding assistant

S Saghafi, R Danas, DJ Dougherty - International Conference on …, 2015 - Springer
We present an approach to understanding first-order theories by exploring their models. A
typical use case is the analysis of artifacts such as policies, protocols, configurations, and …

Measuring protocol strength with security goals

PD Rowe, JD Guttman, MD Liskov - International Journal of Information …, 2016 - Springer
Flaws in published standards for security protocols are found regularly, often after systems
implementing those standards have been deployed. Because of deployment constraints and …

[图书][B] Semirings as building blocks in cryptography

M Durcheva - 2019 - books.google.com
Semirings as an algebraic structure have been known since 1934, but remained unapplied
for mathematical purposes for a long time. It has only been in the past decade that they have …

Leakiness is decidable for well-founded protocols

S Fröschle - International Conference on Principles of Security and …, 2015 - Springer
A limit to algorithmic verification of security protocols is posed by the fact that checking
whether a security property such as secrecy is satisfied is undecidable in general. In this …

A decidable class of security protocols for both reachability and equivalence properties

V Cortier, S Delaune, V Sundararajan - Journal of Automated Reasoning, 2021 - Springer
We identify a new decidable class of security protocols, both for reachability and
equivalence properties. Our result holds for an unbounded number of sessions and for …

Enrich-by-need protocol analysis for Diffie-Hellman

MD Liskov, JD Guttman, JD Ramsdell, PD Rowe… - Foundations of Security …, 2019 - Springer
Enrich-by-need analysis characterizes all executions of a security protocol that extend a
given scenario. It computes a strongest security goal the protocol achieves in that scenario …

Improving automated protocol verification: real world cryptography

D Jackson - 2020 - ora.ox.ac.uk
Analysing the security of cryptographic protocols by hand is a challenging endeavour. It
requires substantial expertise, weeks of intensive effort and the resulting proof of security …