We prove a parallel compositionality result for protocols with a shared mutable state, ie, stateful protocols. For protocols satisfying certain compositionality conditions our result …
Y Lindell - Journal of Cryptology, 2008 - Springer
In the setting of concurrent self composition, a single protocol is executed many times concurrently in a network. In this paper, we prove lower bounds and impossibility results for …
V Cortier - Theory of Security and Applications: Joint Workshop …, 2012 - Springer
Security protocols are small distributed programs that are designed to ensure security over untrusted networks such as the Internet. They are notoriously dificult to design and flaws can …
We provide in this AFP entry several relative soundness results for security protocols. In particular, we prove typing and compositionality results for stateful protocols (ie, protocols …
C Cremers - Proceedings of the 2008 ACM symposium on …, 2008 - dl.acm.org
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of the …
Y Lindell - Theory of Cryptography Conference, 2004 - Springer
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove that there exist many …
Many authentication and key exchange protocols are built using an accepted set of standard concepts such as Diffie–Hellman key exchange, nonces to avoid replay, certificates from an …
C Cremers - Electronic Notes in Theoretical Computer Science, 2006 - Elsevier
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-) automatic tools for the …
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is computationally unbounded) implies security under …