Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

Hybrid consensus: Efficient consensus in the permissionless model

R Pass, E Shi - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Consensus, or state machine replication is a foundational building block of distributed
systems and modern cryptography. Consensus in the classical, permissioned setting has …

A computationally sound mechanized prover for security protocols

B Blanchet - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
We present a new mechanized prover for secrecy properties of security protocols. In contrast
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …

Formal abstractions for attested execution secure processors

R Pass, E Shi, F Tramer - … in Cryptology–EUROCRYPT 2017: 36th Annual …, 2017 - Springer
Realistic secure processors, including those built for academic and commercial purposes,
commonly realize an “attested execution” abstraction. Despite being the de facto standard …

An introduction to morphological neural networks

GX Ritter, P Sussner - Proceedings of 13th International …, 1996 - ieeexplore.ieee.org
The theory of artificial neural networks has been successfully applied to a wide variety of
pattern recognition problems. In this paper we introduce a novel class of neural networks …

Current-state opacity formulations in probabilistic finite automata

A Saboori, CN Hadjicostis - IEEE Transactions on automatic …, 2013 - ieeexplore.ieee.org
A system is said to be current-state opaque if the entrance of the system state to a set of
secret states remains opaque (uncertain) to an intruder-at least until the system leaves the …

A survey of symbolic methods in computational analysis of cryptographic systems

V Cortier, S Kremer, B Warinschi - Journal of Automated Reasoning, 2011 - Springer
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …

Automated security proofs with sequences of games

B Blanchet, D Pointcheval - Annual International Cryptology Conference, 2006 - Springer
This paper presents the first automatic technique for proving not only protocols but also
primitives in the exact security computational model. Automatic proofs of cryptographic …

Computational soundness of observational equivalence

H Comon-Lundh, V Cortier - Proceedings of the 15th ACM conference on …, 2008 - dl.acm.org
Many security properties are naturally expressed as indistinguishability between two
versions of a protocol. In this paper, we show that computational proofs of indistinguishability …

Probabilistic polynomial-time semantics for a protocol security logic

A Datta, A Derek, JC Mitchell, V Shmatikov… - … Colloquium on Automata …, 2005 - Springer
We describe a cryptographically sound formal logic for proving protocol security properties
without explicitly reasoning about probability, asymptotic complexity, or the actions of a …