Security protocol verification: Symbolic and computational models
B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …
paper surveys various approaches in this area, considering the verification in the symbolic …
Hybrid consensus: Efficient consensus in the permissionless model
Consensus, or state machine replication is a foundational building block of distributed
systems and modern cryptography. Consensus in the classical, permissioned setting has …
systems and modern cryptography. Consensus in the classical, permissioned setting has …
Universally composable security: A new paradigm for cryptographic protocols
R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …
universally composable security. The salient property of universally composable definitions …
A computationally sound mechanized prover for security protocols
B Blanchet - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
We present a new mechanized prover for secrecy properties of security protocols. In contrast
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …
Universally composable signature, certification, and authentication
R Canetti - Proceedings. 17th IEEE Computer Security …, 2004 - ieeexplore.ieee.org
Recently some efforts were made towards capturing the security requirements from digital
signature schemes as an ideal functionality within a composable security framework. This …
signature schemes as an ideal functionality within a composable security framework. This …
Formal abstractions for attested execution secure processors
Realistic secure processors, including those built for academic and commercial purposes,
commonly realize an “attested execution” abstraction. Despite being the de facto standard …
commonly realize an “attested execution” abstraction. Despite being the de facto standard …
An introduction to morphological neural networks
The theory of artificial neural networks has been successfully applied to a wide variety of
pattern recognition problems. In this paper we introduce a novel class of neural networks …
pattern recognition problems. In this paper we introduce a novel class of neural networks …
Bounded key-dependent message security
We construct the first public-key encryption scheme that is proven secure (in the standard
model, under standard assumptions) even when the attacker gets access to encryptions of …
model, under standard assumptions) even when the attacker gets access to encryptions of …
A survey of symbolic methods in computational analysis of cryptographic systems
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …
One of the approaches relies on a computational model that considers issues of complexity …
The reactive simulatability (RSIM) framework for asynchronous systems
We define reactive simulatability for general asynchronous systems. Roughly, simulatability
means that a real system implements an ideal system (specification) in a way that preserves …
means that a real system implements an ideal system (specification) in a way that preserves …