The inductive approach to verifying cryptographic protocols

LC Paulson - Journal of computer security, 1998 - content.iospress.com
Informal arguments that cryptographic protocols are secure can be made rigorous using
inductive definitions. The approach is based on ordinary predicate calculus and copes with …

[图书][B] The modelling and analysis of security protocols: the CSP approach

P Ryan, SA Schneider - 2001 - books.google.com
Security protocols are one of the most critical elements in enabling the secure
communication and processing of information, ensuring its confidentiality, integrity …

Formal methods for cryptographic protocol analysis: Emerging issues and trends

C Meadows - IEEE journal on selected areas in …, 2003 - ieeexplore.ieee.org
The history of the application of formal methods to cryptographic protocol analysis spans
over 20 years and has been showing signs of new maturity and consolidation. Not only have …

The logic of authentication protocols

P Syverson, I Cervesato - International school on foundations of security …, 2000 - Springer
The rationale of authentication has been a topic of study for about a decade and a half. First
attempts at formal analysis of authentication protocols were not using logics per se, but were …

Open issues in formal methods for cryptographic protocol analysis

C Meadows - Proceedings DARPA Information Survivability …, 2000 - ieeexplore.ieee.org
The history of the application of formal methods to cryptographic protocol analysis spans
nearly twenty years, and recently has been showing signs of new maturity and …

[PDF][PDF] A Security Analysis of the Cliques Protocols Suites.

O Pereira, JJ Quisquater - csfw, 2001 - researchgate.net
Secure group protocols are not easy to design: this paper will show new attacks found
against a protocol suite for sharing key. The method we propose to analyse these protocols …

Some attacks upon authenticated group key agreement protocols

O Pereira, JJ Quisquater - Journal of Computer Security, 2003 - content.iospress.com
During the last few years, a number of authenticated group key agreement protocols have
been proposed in the literature. We observed that the efforts in this domain were mostly …

Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives

C Meadows - Proceedings of the First Workshop on Issues in the …, 2000 - apps.dtic.mil
We have recently seen the development of a number of new tools for the analysis of
cryptographic protocols. Many of them are based on state exploration, that is, they try to find …

Verifying security protocols: An application of CSP

S Schneider, R Delicata - … Sequential Processes. The First 25 Years …, 2005 - Springer
The field of protocol analysis is one area in which CSP has proven particularly successful,
and several techniques have been proposed that use CSP to reason about security …

Automata-based analysis of recursive cryptographic protocols

R Küsters, T Wilke - Annual Symposium on Theoretical Aspects of …, 2004 - Springer
Cryptographic protocols can be divided into (1) protocols where the protocol steps are
simple from a computational point of view and can thus be modeled by simple means, for …