From one session to many: Dynamic tags for security protocols

M Arapinis, S Delaune, S Kremer - International Conference on Logic for …, 2008 - Springer
The design and verification of cryptographic protocols is a notoriously difficult task, even in
abstract Dolev-Yao models. This is mainly due to several sources of unboundedness (size of …

[图书][B] Logical Analysis and Complexity of Security Protocols

NA Durgin - 2003 - search.proquest.com
Abstract We formalize the Dolev-Yao model of security protocols using two different
notations, one based on multiset rewriting with existentials, and the other based on a …

Towards a quantitative analysis of security protocols

P Adao, P Mateus, T Reis, L Viganò - Electronic Notes in Theoretical …, 2006 - Elsevier
This paper contributes to further closing the gap between formal analysis and concrete
implementations of security protocols by introducing a quantitative extension of the usual …

Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions

Y Chevalier, R Küsters, M Rusinowitch… - … Workshop on Computer …, 2003 - Springer
We propose a protocol model which integrates two different ways of analyzing cryptographic
protocols: i) analysis wrt an unbounded number of sessions and bounded message size …

[HTML][HTML] Bounding messages for free in security protocols–extension to various security properties

M Arapinis, M Duflot - Information and Computation, 2014 - Elsevier
While the verification of security protocols has been proved to be undecidable in general,
several approaches use simplifying hypotheses in order to obtain decidability for interesting …

CryptoVerif: a Computationally-Sound Security Protocol Verifier (Initial Version with Communications on Channels)

B Blanchet - arXiv preprint arXiv:2310.14658, 2023 - arxiv.org
This document presents the security protocol verifier CryptoVerif. CryptoVerif does not rely
on the symbolic, Dolev-Yao model, but on the computational model. It can verify secrecy …

Multiset rewriting and the complexity of bounded security protocols

N Durgin, P Lincoln, J Mitchell… - Journal of Computer …, 2004 - content.iospress.com
Abstract We formalize the Dolev–Yao model of security protocols, using a notation based on
multiset rewriting with existentials. The goals are to provide a simple formal notation for …

A computationally sound mechanized prover for security protocols

B Blanchet - IEEE Transactions on Dependable and Secure …, 2008 - ieeexplore.ieee.org
We present a new mechanized prover for secrecy properties of security protocols. In contrast
to most previous provers, our tool does not rely on the Dolev-Yao model, but on the …

Verification of randomized security protocols

R Chadha, AP Sistla… - 2017 32nd Annual ACM …, 2017 - ieeexplore.ieee.org
We consider the problem of verifying the security of finitely many sessions of a protocol that
tosses coins in addition to standard cryptographic primitives against a Dolev-Yao adversary …

Transducer-based analysis of cryptographic protocols

R Küsters, T Wilke - Information and Computation, 2007 - Elsevier
Cryptographic protocols can be divided into (1) protocols where the protocol steps are
simple from a computational point of view and can thus be modeled by simple means, for …