Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

Formal certification of code-based cryptographic proofs

G Barthe, B Grégoire, S Zanella Béguelin - Proceedings of the 36th …, 2009 - dl.acm.org
As cryptographic proofs have become essentially unverifiable, cryptographers have argued
in favor of develo** techniques that help tame the complexity of their proofs. Game-based …

A computationally sound mechanized prover for security protocols

B Blanchet - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
We present a new mechanized prover for secrecy properties of security protocols. In contrast
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …

A composable cryptographic library with nested operations

M Backes, B Pfitzmann, M Waidner - … of the 10th ACM conference on …, 2003 - dl.acm.org
We present the first idealized cryptographic library that can be used like the Dolev-Yao
model for automated proofs of cryptographic protocols that use nested cryptographic …

A general composition theorem for secure reactive systems

M Backes, B Pfitzmann, M Waidner - Theory of Cryptography Conference, 2004 - Springer
We consider compositional properties of reactive systems that are secure in a cryptographic
sense. We follow the well-known simulatability approach of modern cryptography, ie, the …

A survey of symbolic methods in computational analysis of cryptographic systems

V Cortier, S Kremer, B Warinschi - Journal of Automated Reasoning, 2011 - Springer
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …

The reactive simulatability (RSIM) framework for asynchronous systems

M Backes, B Pfitzmann, M Waidner - Information and Computation, 2007 - Elsevier
We define reactive simulatability for general asynchronous systems. Roughly, simulatability
means that a real system implements an ideal system (specification) in a way that preserves …

Symmetric encryption in a simulatable Dolev-Yao style cryptographic library

M Backes, B Pfitzmann - Proceedings. 17th IEEE Computer …, 2004 - ieeexplore.ieee.org
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in
virtually all automated protocol provers under active attacks and in arbitrary protocol …

Key-dependent message security under active attacks–BRSIM/UC-soundness of Dolev–Yao-style encryption with key cycles

M Backes, B Pfitzmann… - Journal of Computer …, 2008 - content.iospress.com
Key-dependent message (KDM) security was introduced by Black, Rogaway and Shrimpton
to address the case where key cycles occur among encryptions, eg, a key is encrypted with …

Computationally sound mechanized proofs of correspondence assertions

B Blanchet - 20th IEEE Computer Security Foundations …, 2007 - ieeexplore.ieee.org
We present a new mechanized prover for showing correspondence assertions for
cryptographic protocols in the computational model. Correspondence assertions are useful …