Security protocol verification: Symbolic and computational models
B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …
paper surveys various approaches in this area, considering the verification in the symbolic …
Hybrid consensus: Efficient consensus in the permissionless model
Consensus, or state machine replication is a foundational building block of distributed
systems and modern cryptography. Consensus in the classical, permissioned setting has …
systems and modern cryptography. Consensus in the classical, permissioned setting has …
A computationally sound mechanized prover for security protocols
B Blanchet - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
We present a new mechanized prover for secrecy properties of security protocols. In contrast
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …
Formal abstractions for attested execution secure processors
Realistic secure processors, including those built for academic and commercial purposes,
commonly realize an “attested execution” abstraction. Despite being the de facto standard …
commonly realize an “attested execution” abstraction. Despite being the de facto standard …
An introduction to morphological neural networks
The theory of artificial neural networks has been successfully applied to a wide variety of
pattern recognition problems. In this paper we introduce a novel class of neural networks …
pattern recognition problems. In this paper we introduce a novel class of neural networks …
Current-state opacity formulations in probabilistic finite automata
A Saboori, CN Hadjicostis - IEEE Transactions on automatic …, 2013 - ieeexplore.ieee.org
A system is said to be current-state opaque if the entrance of the system state to a set of
secret states remains opaque (uncertain) to an intruder-at least until the system leaves the …
secret states remains opaque (uncertain) to an intruder-at least until the system leaves the …
A survey of symbolic methods in computational analysis of cryptographic systems
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …
One of the approaches relies on a computational model that considers issues of complexity …
Automated security proofs with sequences of games
This paper presents the first automatic technique for proving not only protocols but also
primitives in the exact security computational model. Automatic proofs of cryptographic …
primitives in the exact security computational model. Automatic proofs of cryptographic …
Computational soundness of observational equivalence
Many security properties are naturally expressed as indistinguishability between two
versions of a protocol. In this paper, we show that computational proofs of indistinguishability …
versions of a protocol. In this paper, we show that computational proofs of indistinguishability …
Probabilistic polynomial-time semantics for a protocol security logic
We describe a cryptographically sound formal logic for proving protocol security properties
without explicitly reasoning about probability, asymptotic complexity, or the actions of a …
without explicitly reasoning about probability, asymptotic complexity, or the actions of a …