A tutorial on physical security and side-channel attacks

F Koeune, FX Standaert - International School on Foundations of Security …, 2004 - Springer
A recent branch of cryptography focuses on the physical constraints that a real-life
cryptographic device must face, and attempts to exploit these constraints (running time …

Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

[PS][PS] An E cient Cryptographic Protocol Verifier Based on Prolog Rules

B Blanchet - 14th IEEE Computer Security Foundations Workshop …, 2001 - csl.sri.com
An E cient Cryptographic Protocol Veri er Based on Prolog Rules Page 1 An E cient
Cryptographic Protocol Veri er Based on Prolog Rules Bruno Blanchet INRIA Rocquencourt …

Automatic verification of security protocols in the symbolic model: The verifier proverif

B Blanchet - International School on Foundations of Security …, 2012 - Springer
After giving general context on the verification of security protocols, we focus on the
automatic symbolic protocol verifier ProVerif. This verifier can prove secrecy, authentication …

Authenticity by typing for security protocols

AD Gordon, A Jeffrey - Journal of computer security, 2003 - content.iospress.com
We propose a new method to check authenticity properties of cryptographic protocols. First,
code up the protocol in the spi-calculus of Abadi and Gordon. Second, specify authenticity …

Automated verification of remote electronic voting protocols in the applied pi-calculus

M Backes, C Hritcu, M Maffei - 2008 21st IEEE Computer …, 2008 - ieeexplore.ieee.org
We present a general technique for modeling remote electronic voting protocols in the
applied pi-calculus and for automatically verifying their security. In the first part of this paper …

Analyzing security protocols with secrecy types and logic programs

M Abadi, B Blanchet - Journal of the ACM (JACM), 2005 - dl.acm.org
We study and further develop two language-based techniques for analyzing security
protocols. One is based on a typed process calculus; the other, on untyped logic programs …

Pretty good democracy

PYA Ryan, V Teague - … XVII: 17th International Workshop, Cambridge, UK …, 2013 - Springer
Code voting seeks to address the issues of privacy and integrity for Remote Internet Voting.
It sidesteps many of the inherent vulnerabilities of the Internet and client platforms but it does …

Types and effects for asymmetric cryptographic protocols

AD Gordon, A Jeffrey - Journal of Computer Security, 2004 - content.iospress.com
We present the first type and effect system for proving authenticity properties of security
protocols based on asymmetric cryptography. The most significant new features of our type …

Static validation of security protocols

C Bodei, M Buchholtz, P Degano… - Journal of …, 2005 - content.iospress.com
We methodically expand protocol narrations into terms of a process algebra in order to
specify some of the checks that need to be made in a protocol. We then apply static analysis …