Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

Formal verification of security protocol implementations: a survey

M Avalle, A Pironti, R Sisto - Formal Aspects of Computing, 2014 - Springer
Automated formal verification of security protocols has been mostly focused on analyzing
high-level abstract models which, however, are significantly different from real protocol …

Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach

N Kobeissi, K Bhargavan… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Many popular web applications incorporate end-toend secure messaging protocols, which
seek to ensure that messages sent between users are kept confidential and authenticated …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

Automatic text location in images and video frames

AK Jain, B Yu - Pattern recognition, 1998 - Elsevier
Textual data is very important in a number of applications such as image database indexing
and document understanding. The goal of automatic text location without character …

[PDF][PDF] ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial

B Blanchet, B Smyth, V Cheval… - Version from, 2018 - bblanche.gitlabpages.inria.fr
This manual describes the ProVerif software package version 2.05. ProVerif is a tool for
automatically analyzing the security of cryptographic protocols. Support is provided for, but …

[PDF][PDF] EMV in a nutshell

J Van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter - 2016 - cs.ru.nl
EMV is the leading international standard for payment smartcards, used by over a billion
cards worldwide. EMV is not a single protocol, but a large family of complex protocols, with …