Computer-aided security proofs for the working cryptographer
We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic
systems from proof sketches–compact, formal representations of the essence of a proof as a …
systems from proof sketches–compact, formal representations of the essence of a proof as a …
Formal certification of code-based cryptographic proofs
As cryptographic proofs have become essentially unverifiable, cryptographers have argued
in favor of develo** techniques that help tame the complexity of their proofs. Game-based …
in favor of develo** techniques that help tame the complexity of their proofs. Game-based …
A survey of symbolic methods in computational analysis of cryptographic systems
Since the 1980s, two approaches have been developed for analyzing security protocols.
One of the approaches relies on a computational model that considers issues of complexity …
One of the approaches relies on a computational model that considers issues of complexity …
CryptoVerif: a Computationally-Sound Security Protocol Verifier (Initial Version with Communications on Channels)
B Blanchet - arxiv preprint arxiv:2310.14658, 2023 - arxiv.org
This document presents the security protocol verifier CryptoVerif. CryptoVerif does not rely
on the symbolic, Dolev-Yao model, but on the computational model. It can verify secrecy …
on the symbolic, Dolev-Yao model, but on the computational model. It can verify secrecy …
Cryptographically sound security proofs for basic and public-key kerberos
We present a computational analysis of basic Kerberos and Kerberos with public-key
authentication (PKINIT) in which we consider authentication and key secrecy properties. Our …
authentication (PKINIT) in which we consider authentication and key secrecy properties. Our …
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC
Governments and international standards bodies have established certification procedures
for security-critical technologies, such as cryptographic algorithms. Such standards have not …
for security-critical technologies, such as cryptographic algorithms. Such standards have not …
Cryptographically sound security proofs for basic and public-key Kerberos
We present a computational analysis of basic Kerberos with and without its public-key
extension PKINIT in which we consider authentication and key secrecy properties. Our …
extension PKINIT in which we consider authentication and key secrecy properties. Our …
Automatically verified mechanized proof of one-encryption key exchange
B Blanchet - 2012 IEEE 25th Computer Security Foundations …, 2012 - ieeexplore.ieee.org
We present a mechanized proof of the password-based protocol One-Encryption Key
Exchange (OEKE) using the computationally-sound protocol prover Crypto Verif. OEKE is a …
Exchange (OEKE) using the computationally-sound protocol prover Crypto Verif. OEKE is a …
Formal verification of cryptographic security proofs
M Berg - 2013 - publikationen.sulb.uni-saarland.de
Verifying cryptographic security proofs manually is inherently tedious and error-prone. The
game-playing technique for cryptographic proofs advocates a modular proof design where …
game-playing technique for cryptographic proofs advocates a modular proof design where …
Formal certification of game-based cryptographic proofs
S Zanella-Béguelin - 2010 - microsoft.com
The game-based approach is a popular methodology for structuring cryptographic proofs as
sequences of games. Game-based proofs can be rigorously formalized by taking a code …
sequences of games. Game-based proofs can be rigorously formalized by taking a code …