Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security protocol verification: Symbolic and computational models
B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …
paper surveys various approaches in this area, considering the verification in the symbolic …
Formal certification of code-based cryptographic proofs
As cryptographic proofs have become essentially unverifiable, cryptographers have argued
in favor of develo** techniques that help tame the complexity of their proofs. Game-based …
in favor of develo** techniques that help tame the complexity of their proofs. Game-based …
A computationally sound mechanized prover for security protocols
B Blanchet - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
We present a new mechanized prover for secrecy properties of security protocols. In contrast
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …
A composable cryptographic library with nested operations
We present the first idealized cryptographic library that can be used like the Dolev-Yao
model for automated proofs of cryptographic protocols that use nested cryptographic …
model for automated proofs of cryptographic protocols that use nested cryptographic …
A general composition theorem for secure reactive systems
We consider compositional properties of reactive systems that are secure in a cryptographic
sense. We follow the well-known simulatability approach of modern cryptography, ie, the …
sense. We follow the well-known simulatability approach of modern cryptography, ie, the …
A survey of symbolic methods in computational analysis of cryptographic systems
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …
One of the approaches relies on a computational model that considers issues of complexity …
The reactive simulatability (RSIM) framework for asynchronous systems
We define reactive simulatability for general asynchronous systems. Roughly, simulatability
means that a real system implements an ideal system (specification) in a way that preserves …
means that a real system implements an ideal system (specification) in a way that preserves …
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
M Backes, B Pfitzmann - Proceedings. 17th IEEE Computer …, 2004 - ieeexplore.ieee.org
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in
virtually all automated protocol provers under active attacks and in arbitrary protocol …
virtually all automated protocol provers under active attacks and in arbitrary protocol …
Key-dependent message security under active attacks–BRSIM/UC-soundness of Dolev–Yao-style encryption with key cycles
M Backes, B Pfitzmann… - Journal of Computer …, 2008 - content.iospress.com
Key-dependent message (KDM) security was introduced by Black, Rogaway and Shrimpton
to address the case where key cycles occur among encryptions, eg, a key is encrypted with …
to address the case where key cycles occur among encryptions, eg, a key is encrypted with …
Computationally sound mechanized proofs of correspondence assertions
B Blanchet - 20th IEEE Computer Security Foundations …, 2007 - ieeexplore.ieee.org
We present a new mechanized prover for showing correspondence assertions for
cryptographic protocols in the computational model. Correspondence assertions are useful …
cryptographic protocols in the computational model. Correspondence assertions are useful …