Owl: Compositional verification of security protocols via an information-flow type system

J Gancher, S Gibson, P Singh… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Computationally sound protocol verification tools promise to deliver full-strength
cryptographic proofs for security protocols. Unfortunately, current tools lack either modularity …

[PDF][PDF] OWL: Compositional Verification of Security Protocols via an Information-Flow Type System

J Gancher, S Gibson, P Singh, S Dharanikota, B Parno - contrib.andrew.cmu.edu
Computationally sound protocol verification tools promise to deliver full-strength
cryptographic proofs for security protocols. Unfortunately, current tools lack either modularity …

[PDF][PDF] OWL: Compositional Verification of Security Protocols via an Information-Flow Type System

J Gancher, S Gibson, P Singh, S Dharanikota, B Parno - andrew.cmu.edu
Computationally sound protocol verification tools promise to deliver full-strength
cryptographic proofs for security protocols. Unfortunately, current tools lack either modularity …

Owl: Compositional Verification of Security Protocols via an Information-Flow Type System

J Gancher, S Gibson, P Singh… - 2023 IEEE Symposium …, 2023 - computer.org
Computationally sound protocol verification tools promise to deliver full-strength
cryptographic proofs for security protocols. Unfortunately, current tools lack either modularity …

[PDF][PDF] Owl: Compositional Verification of Security Protocols via an Information-Flow Type System

J Gancher, S Gibson, P Singh, S Dharanikota… - Proceedings of the …, 2023 - par.nsf.gov
Computationally sound protocol verification tools promise to deliver full-strength
cryptographic proofs for security protocols. Unfortunately, current tools lack either modularity …

Owl: Compositional Verification of Security Protocols via an Information-Flow Type System

J Gancher, S Gibson, P Singh, S Dharanikota… - Cryptology ePrint …, 2023 - eprint.iacr.org
Computationally sound protocol verification tools promise to deliver full-strength
cryptographic proofs for security protocols. Unfortunately, current tools lack either modularity …