Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Automated verification of selected equivalences for security protocols

B Blanchet, M Abadi, C Fournet - The Journal of Logic and Algebraic …, 2008 - Elsevier
In the analysis of security protocols, methods and tools for reasoning about protocol
behaviors have been quite effective. We aim to expand the scope of those methods and …

Automatic proof of strong secrecy for security protocols

B Blanchet - IEEE Symposium on Security and Privacy, 2004 …, 2004 - ieeexplore.ieee.org
We present a new automatic technique for proving strong secrecy for security protocols.
Strong secrecy means that an adversary cannot see any difference when the value of the …

Deciding security of protocols against off-line guessing attacks

M Baudet - Proceedings of the 12th ACM conference on Computer …, 2005 - dl.acm.org
We provide an effective procedure for deciding the existence of off-line guessing attacks on
security protocols, for a bounded number of sessions. The procedure consists of a constraint …

Analysing password protocol security against off-line dictionary attacks

R Corin, J Doumen, S Etalle - Electronic Notes in Theoretical Computer …, 2005 - Elsevier
We study the security of password protocols against off-line dictionary attacks. In addition to
the standard adversary abilities, we also consider further cryptographic advantages given to …

3D model-based hand tracking using stochastic direct search method

JY Lin, Y Wu, TS Huang - Sixth IEEE International Conference …, 2004 - ieeexplore.ieee.org
Tracking the articulated hand motion in a video sequence is a challenging problem in which
the main difficulty arises from the complexity of searching for an optimal motion estimate in a …

A theory of dictionary attacks and its complexity

S Delaune, F Jacquemard - Proceedings. 17th IEEE Computer …, 2004 - ieeexplore.ieee.org
We consider the problem of automating proofs of cryptographic protocols when some data,
like poorly chosen passwords, can be guessed by dictionary attacks. First, we define a …

Password-based encryption analyzed

M Abadi, B Warinschi - International Colloquium on Automata, Languages …, 2005 - Springer
The use of passwords in security protocols is particularly delicate because of the possibility
of off-line guessing attacks. We study password-based protocols in the context of a recent …

Guessing attacks and the computational soundness of static equivalence

M Abadi, M Baudet, B Warinschi - … on Foundations of Software Science and …, 2006 - Springer
The indistinguishability of two pieces of data (or two lists of pieces of data) can be
represented formally in terms of a relation called static equivalence. Static equivalence …

[PDF][PDF] Sécurité des protocoles cryptographiques: aspects logiques et calculatoires

M Baudet - 2007 - theses.hal.science
Cette thèse est consacrée au problème de la vérification automatique des protocoles
cryptographiques d'un point de vue logique et calculatoire. Dans une première partie, nous …