OFMC: A symbolic model checker for security protocols

D Basin, S Mödersheim, L Vigano - International Journal of Information …, 2005 - Springer
We present the on-the-fly model checker OFMC, a tool that combines two ideas for analyzing
security protocols based on lazy, demand-driven search. The first is the use of lazy data …

A comparative survey on lightweight block ciphers for resource constrained applications

P Singh, B Acharya… - International Journal of …, 2019 - inderscienceonline.com
Information security for low-resource devices has received a fair amount of attention in
recent years. These devices have physical constraint in terms of area, power, and memory …

YAPA: A generic tool for computing intruder knowledge

M Baudet, V Cortier, S Delaune - ACM Transactions On Computational …, 2013 - dl.acm.org
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses
of security protocols. In the framework of the applied pi-calculus, as in similar languages …

Tree automata with one memory set constraints and cryptographic protocols

H Comon, V Cortier - Theoretical Computer Science, 2005 - Elsevier
We introduce a class of tree automata that perform tests on a memory that is updated using
function symbol application and projection. The language emptiness problem for this class …

Computationally sound implementations of equational theories against passive adversaries

M Baudet, V Cortier, S Kremer - International Colloquium on Automata …, 2005 - Springer
In this paper we study the link between formal and cryptographic models for security
protocols in the presence of a passive adversary. In contrast to other works, we do not …

Symbolic bisimulation in the spi calculus

J Borgström, S Briais, U Nestmann - International Conference on …, 2004 - Springer
The spi calculus is an executable model for the description and analysis of cryptographic
protocols. Security objectives like secrecy and authenticity can be formulated as equations …

Formal verification of LTE-UMTS and LTE–LTE handover procedures

PB Copet, G Marchetto, R Sisto, L Costa - Computer Standards & Interfaces, 2017 - Elsevier
Abstract Long Term Evolution (LTE) is the most recent standard in mobile communications,
introduced by 3rd Generation Partnership Project (3GPP). Most of the works in literature …

[PDF][PDF] Formal analysis of optimistic fair exchange protocols

S Kremer - Universit'e Libre de Bruxelles Facult'e des Sciences, 2003 - Citeseer
Security of information has become of increasing importance in today's information society.
Sensitive information such as credit card numbers is sent over the Internet every day …

A robust, low-cost and secure authentication scheme for IoT applications

MJ Mahmod, U Guin - Cryptography, 2020 - mdpi.com
The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly
susceptible to piracy. These pirated edge devices pose a serious threat to security, as an …

Security analysis of civil registry database of Ecuador

SMT Toapanta, LEM Gallegos… - … Conference on Electrical …, 2016 - ieeexplore.ieee.org
It considers at this stage to define the structure of reliability and safe future identification
system and develop or adopt appropriate algorithms and security protocols to cover …