Roles in cryptographic protocols do not always have a linear execution, but may include choice points causing the protocol to continue along different paths. In this paper we …
In this paper, we perform an automated analysis of two devices developed by Yubico: YubiKey, designed to authenticate a user to network-based services, and YubiHSM, Yubicos …
[EN] The Maude-NPA crypto tool is a specialized model checker for cryptographic security protocols that take into account the algebraic properties of the cryptosystem. In the literature …
This paper gives a modular verification methodology in which, given parametric specifications of a key establishment protocol P and a protocol Q providing private channel …
C Meadows, S Escobar… - Engineering Secure and …, 2019 - ebooks.iospress.nl
This paper describes the latest version (3. x) of the Maude-NRL Protocol Analyzer (Maude- NPA), a tool for the analysis of cryptographic protocols that provides support for equational …
Formal methods have been used in analyzing cryptographic protocols since the 1980's. Formal analysis of cryptographic protocols involves properties that are generally …