Protocol composition logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network
protocols that use public and symmetric key cryptography. The logic is designed around a …
protocols that use public and symmetric key cryptography. The logic is designed around a …
A modular correctness proof of IEEE 802.11 i and TLS
The IEEE 802.11 i wireless networking protocol provides mutual authentication between a
network access point and user devices prior to user connectivity. The protocol consists of …
network access point and user devices prior to user connectivity. The protocol consists of …
A derivation system and compositional logic for security protocols
Many authentication and key exchange protocols are built using an accepted set of standard
concepts such as Diffie–Hellman key exchange, nonces to avoid replay, certificates from an …
concepts such as Diffie–Hellman key exchange, nonces to avoid replay, certificates from an …
Methods and apparatuses for user-verifiable trusted path in the presence of malware
An apparatus and method for establishing a trusted path between a user interface and a
trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The …
trusted executable, wherein the trusted path includes a hypervisor and a driver shim. The …
Static validation of security protocols
C Bodei, M Buchholtz, P Degano… - Journal of …, 2005 - content.iospress.com
We methodically expand protocol narrations into terms of a process algebra in order to
specify some of the checks that need to be made in a protocol. We then apply static analysis …
specify some of the checks that need to be made in a protocol. We then apply static analysis …
Probabilistic polynomial-time semantics for a protocol security logic
We describe a cryptographically sound formal logic for proving protocol security properties
without explicitly reasoning about probability, asymptotic complexity, or the actions of a …
without explicitly reasoning about probability, asymptotic complexity, or the actions of a …
[BOOK][B] Formal correctness of security protocols
G Bella - 2007 - books.google.com
Computer network security is critical to fraud prevention and accountability. Network
participants are required to observe predefined steps called security protocols, whose proof …
participants are required to observe predefined steps called security protocols, whose proof …
[PDF][PDF] Categorical composable cryptography.
A Broadbent, M Karvonen - FoSSaCS, 2022 - library.oapen.org
We formalize the simulation paradigm of cryptography in terms of category theory and show
that protocols secure against abstract attacks form a symmetric monoidal category, thus …
that protocols secure against abstract attacks form a symmetric monoidal category, thus …
Secure protocol composition
Modular composition of security mechanisms is complicated by the way that one mechanism
may reveal information that interferes with the security of another. We develop methods for …
may reveal information that interferes with the security of another. We develop methods for …
Categorical composable cryptography: extended version
A Broadbent, M Karvonen - Logical Methods in Computer …, 2024 - lmcs.episciences.org
We formalize the simulation paradigm of cryptography in terms of category theory and show
that protocols secure against abstract attacks form a symmetric monoidal category, thus …
that protocols secure against abstract attacks form a symmetric monoidal category, thus …