Decidability of trace equivalence for protocols with nonces
Privacy properties such as anonymity, unlink ability, or vote secrecy are typically expressed
as equivalence properties. In this paper, we provide the first decidability result for trace …
as equivalence properties. In this paper, we provide the first decidability result for trace …
Symbolic proofs for lattice-based cryptography
Symbolic methods have been used extensively for proving security of cryptographic
protocols in the Dolev-Yao model, and more recently for proving security of cryptographic …
protocols in the Dolev-Yao model, and more recently for proving security of cryptographic …
Experimental study of Diffie-Hellman key exchange algorithm on embedded devices
P Deshpande, S Santhanalakshmi… - … , Data Analytics and …, 2017 - ieeexplore.ieee.org
Security in Embedded systems has become an important constraint in modern days. There
are different cryptographic algorithms developed for providing data security. Among these …
are different cryptographic algorithms developed for providing data security. Among these …
Exploring theories with a model-finding assistant
S Saghafi, R Danas, DJ Dougherty - International Conference on …, 2015 - Springer
We present an approach to understanding first-order theories by exploring their models. A
typical use case is the analysis of artifacts such as policies, protocols, configurations, and …
typical use case is the analysis of artifacts such as policies, protocols, configurations, and …
Measuring protocol strength with security goals
PD Rowe, JD Guttman, MD Liskov - International Journal of Information …, 2016 - Springer
Flaws in published standards for security protocols are found regularly, often after systems
implementing those standards have been deployed. Because of deployment constraints and …
implementing those standards have been deployed. Because of deployment constraints and …
[图书][B] Semirings as building blocks in cryptography
M Durcheva - 2019 - books.google.com
Semirings as an algebraic structure have been known since 1934, but remained unapplied
for mathematical purposes for a long time. It has only been in the past decade that they have …
for mathematical purposes for a long time. It has only been in the past decade that they have …
Leakiness is decidable for well-founded protocols
S Fröschle - International Conference on Principles of Security and …, 2015 - Springer
A limit to algorithmic verification of security protocols is posed by the fact that checking
whether a security property such as secrecy is satisfied is undecidable in general. In this …
whether a security property such as secrecy is satisfied is undecidable in general. In this …
A decidable class of security protocols for both reachability and equivalence properties
We identify a new decidable class of security protocols, both for reachability and
equivalence properties. Our result holds for an unbounded number of sessions and for …
equivalence properties. Our result holds for an unbounded number of sessions and for …
Enrich-by-need protocol analysis for Diffie-Hellman
Enrich-by-need analysis characterizes all executions of a security protocol that extend a
given scenario. It computes a strongest security goal the protocol achieves in that scenario …
given scenario. It computes a strongest security goal the protocol achieves in that scenario …
Improving automated protocol verification: real world cryptography
D Jackson - 2020 - ora.ox.ac.uk
Analysing the security of cryptographic protocols by hand is a challenging endeavour. It
requires substantial expertise, weeks of intensive effort and the resulting proof of security …
requires substantial expertise, weeks of intensive effort and the resulting proof of security …