Modeling and verifying security protocols with the applied pi calculus and ProVerif
B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …
primitives, defined by rewrite rules or by equations. It can prove various security properties …
SoK: Computer-aided cryptography
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …
formal, machine-checkable approaches to the design, analysis, and implementation of …
The applied pi calculus: Mobile values, new names, and secure communication
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …
scoped names, with communication via messages on channels. This interaction is crucial in …
Proverif with lemmas, induction, fast subsumption, and much more
This paper presents a major overhaul of one the most widely used symbolic security protocol
verifiers, ProVerif. We provide two main contributions. First, we extend ProVerif with lemmas …
verifiers, ProVerif. We provide two main contributions. First, we extend ProVerif with lemmas …
An interactive prover for protocol verification in the computational model
Given the central importance of designing secure protocols, providing solid mathematical
foundations and computer-assisted methods to attest for their correctness is becoming …
foundations and computer-assisted methods to attest for their correctness is becoming …
DEEPSEC: deciding equivalence properties in security protocols theory and practice
Automated verification has become an essential part in the security evaluation of
cryptographic protocols. Recently, there has been a considerable effort to lift the theory and …
cryptographic protocols. Recently, there has been a considerable effort to lift the theory and …
Automated symbolic proofs of observational equivalence
Many cryptographic security definitions can be naturally formulated as observational
equivalence properties. However, existing automated tools for verifying the observational …
equivalence properties. However, existing automated tools for verifying the observational …
Sok: Secure e-voting with everlasting privacy
Vote privacy is a fundamental right, which needs to be protected not only during an election,
or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e …
or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e …
Formal models and techniques for analyzing security protocols: A tutorial
Security protocols are distributed programs that aim at securing communications by the
means of cryptography. They are for instance used to secure electronic payments, home …
means of cryptography. They are for instance used to secure electronic payments, home …
Decision and complexity of Dolev-Yao hyperproperties
The formal analysis of cryptographic protocols traditionally focuses on trace and
equivalence properties, for which decision procedures in the symbolic (or Dolev-Yao, or DY) …
equivalence properties, for which decision procedures in the symbolic (or Dolev-Yao, or DY) …