A bisimulation method for cryptographic protocols

M Abadi, AD Gordon - European Symposium on Programming, 1998 - Springer
We introduce a definition of bisimulation for cryptographic protocols. The definition includes
a simple and precise model of the knowledge of the environment with which a protocol …

Proof techniques for cryptographic processes

M Boreale, R De Nicola, R Pugliese - SIAM Journal on Computing, 2001 - SIAM
Contextual equivalences for cryptographic process calculi, like the spi-calculus, can be used
to reason about correctness of protocols, but their definition suffers from quantification over …

Deciding framed bisimilarity

H Hüttel - Electronic Notes in Theoretical Computer Science, 2003 - Elsevier
The spi-calculus, proposed by Abadi and Gordon, is a process calculus based on the π-
calculus and is intended for reasoning about the behaviour of cryptographic protocols. We …

Relating two standard notions of secrecy

V Cortier, M Rusinovitch… - Logical Methods in …, 2007 - lmcs.episciences.org
Two styles of definitions are usually considered to express that a security protocol preserves
the confidentiality of a data s. Reachability-based secrecy means that s should never be …

On Bisimulations for the Spi Calculus*

J Borgström, U Nestmann - International Conference on Algebraic …, 2002 - Springer
The spi calculus is an extension of the pi calculus with cryptographic primitives, designed for
the verification of cryptographic protocols. Due to the extension, the naive adaptation of …

On bisimulations for the spi calculus

J Borgström, U Nestmann - Mathematical Structures in Computer …, 2005 - cambridge.org
The spi calculus is an extension of the pi calculus with cryptographic primitives, which was
designed for the verification of cryptographic protocols. Because of this extension, the naive …

Weak equivalences in psi-calculi

M Johansson, J Bengtson, J Parrow… - 2010 25th Annual IEEE …, 2010 - ieeexplore.ieee.org
Psi-calculi extend the pi-calculus with nominal datatypes to represent data, communication
channels, and logics for facts and conditions. This general framework admits highly …

A static analysis of cryptographic processes: The denotational approach

B Aziz, G Hamilton, D Gray - The Journal of Logic and Algebraic …, 2005 - Elsevier
This paper presents a non-uniform static analysis for detecting the term-substitution property
in infinite cryptographic processes specified by the language of the spi calculus. The …

[PDF][PDF] Deciding framed bisimilarity

H Huttel - Proceedings of INFINITY, 2002 - academia.edu
The spi-calculus, proposed by Abadi and Gordon, is a process calculus based on the π-
calculus and is intended for reasoning about the behaviour of cryptographic protocols. We …

Relating two standard notions of secrecy

V Cortier, M Rusinowitch, E Zălinescu - International Workshop on …, 2006 - Springer
Two styles of definitions are usually considered to express that a security protocol preserves
the confidentiality of a data s. Reachability-based secrecy means that s should never be …