Computer-aided security proofs for the working cryptographer

G Barthe, B Grégoire, S Heraud… - Annual Cryptology …, 2011 - Springer
We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic
systems from proof sketches–compact, formal representations of the essence of a proof as a …

Formal certification of code-based cryptographic proofs

G Barthe, B Grégoire, S Zanella Béguelin - Proceedings of the 36th …, 2009 - dl.acm.org
As cryptographic proofs have become essentially unverifiable, cryptographers have argued
in favor of develo** techniques that help tame the complexity of their proofs. Game-based …

A survey of symbolic methods in computational analysis of cryptographic systems

V Cortier, S Kremer, B Warinschi - Journal of Automated Reasoning, 2011 - Springer
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …

CryptoVerif: a Computationally-Sound Security Protocol Verifier (Initial Version with Communications on Channels)

B Blanchet - arxiv preprint arxiv:2310.14658, 2023 - arxiv.org
This document presents the security protocol verifier CryptoVerif. CryptoVerif does not rely
on the symbolic, Dolev-Yao model, but on the computational model. It can verify secrecy …

Cryptographically sound security proofs for basic and public-key kerberos

M Backes, I Cervesato, AD Jaggard, A Scedrov… - … –ESORICS 2006: 11th …, 2006 - Springer
We present a computational analysis of basic Kerberos and Kerberos with public-key
authentication (PKINIT) in which we consider authentication and key secrecy properties. Our …

How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC

S Matsuo, K Miyazaki, A Otsuka, D Basin - Financial Cryptography and …, 2010 - Springer
Governments and international standards bodies have established certification procedures
for security-critical technologies, such as cryptographic algorithms. Such standards have not …

Cryptographically sound security proofs for basic and public-key Kerberos

M Backes, I Cervesato, AD Jaggard, A Scedrov… - International Journal of …, 2011 - Springer
We present a computational analysis of basic Kerberos with and without its public-key
extension PKINIT in which we consider authentication and key secrecy properties. Our …

Automatically verified mechanized proof of one-encryption key exchange

B Blanchet - 2012 IEEE 25th Computer Security Foundations …, 2012 - ieeexplore.ieee.org
We present a mechanized proof of the password-based protocol One-Encryption Key
Exchange (OEKE) using the computationally-sound protocol prover Crypto Verif. OEKE is a …

Formal verification of cryptographic security proofs

M Berg - 2013 - publikationen.sulb.uni-saarland.de
Verifying cryptographic security proofs manually is inherently tedious and error-prone. The
game-playing technique for cryptographic proofs advocates a modular proof design where …

Formal certification of game-based cryptographic proofs

S Zanella-Béguelin - 2010 - microsoft.com
The game-based approach is a popular methodology for structuring cryptographic proofs as
sequences of games. Game-based proofs can be rigorously formalized by taking a code …