SoK: Computer-aided cryptography
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …
formal, machine-checkable approaches to the design, analysis, and implementation of …
A systematic literature review of authentication in Internet of Things for heterogeneous devices
Internet of Things (IoT) has become one of the most significant technologies in recent years
because of possessing the diverse application domains. The variety of applications results …
because of possessing the diverse application domains. The variety of applications results …
Metitarski: Past and future
LC Paulson - International Conference on Interactive Theorem …, 2012 - Springer
A brief overview is presented of MetiTarski 4, an automatic theorem prover for real-valued
special functions: ln, \exp, sin, cos, etc. MetiTarski operates through a unique interaction …
special functions: ln, \exp, sin, cos, etc. MetiTarski operates through a unique interaction …
Principles of remote attestation
G Coker, J Guttman, P Loscocco, A Herzog… - International Journal of …, 2011 - Springer
Remote attestation is the activity of making a claim about properties of a target by supplying
evidence to an appraiser over a network. We identify five central principles to guide …
evidence to an appraiser over a network. We identify five central principles to guide …
AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS
With the rise of Internet of Things (IoT) and Cyber-Physical Systems (CPS), the need for
smart embedded devices is rapidly increasing, and so does the security and privacy risk …
smart embedded devices is rapidly increasing, and so does the security and privacy risk …
Automated verification of remote electronic voting protocols in the applied pi-calculus
We present a general technique for modeling remote electronic voting protocols in the
applied pi-calculus and for automatically verifying their security. In the first part of this paper …
applied pi-calculus and for automatically verifying their security. In the first part of this paper …
PUF-based mutual authentication and session key establishment protocol for IoT devices
Abstract The Internet of things (IoT) is an indispensable part of our daily lives, bringing us
many conveniences, including e-commerce and m-commerce services. Unfortunately, IoT …
many conveniences, including e-commerce and m-commerce services. Unfortunately, IoT …
Verifpal: Cryptographic protocol analysis for the real world
Verifpal is a new automated modeling framework and verifier for cryptographic protocols,
optimized with heuristics for common-case protocol specifications, that aims to work better …
optimized with heuristics for common-case protocol specifications, that aims to work better …
Seems legit: Automated analysis of subtle attacks on protocols that use signatures
The standard definition of security for digital signatures-existential unforgeability-does not
ensure certain properties that protocol designers might expect. For example, in many …
ensure certain properties that protocol designers might expect. For example, in many …